Digital Image Forensic - Methoden: Literatur

Literatur zur Digitalen Bildforensik



2019

  1. S. Abdosalehi & A. Mahmoodi-Aznaveh
    Splicing Localization in Tampered Blurred Images
    Proc. 4th Int. Conf. Pattern Recognition and Image Analysis (IPRIA)
    2019, pp. 46-51
    DOI: 10.1109/PRIA.2019.8785965
    BibTeX
    @inproceedings{Abdosalehi2019,
     author = {Abdosalehi, S. and Mahmoodi-Aznaveh, A.},
     title = {Splicing Localization in Tampered Blurred Images},
     booktitle = {Proc. 4th Int. Conf. Pattern Recognition and Image Analysis (IPRIA)},
     year = {2019},
     pages = {46--51}}
     
  2. P.S. Abhijith & P. Simon
    Improved Blurred Image Splicing Localization with KNN Matting
    Integrated Intelligent Computing, Communication and Security
    Springer, 2019
    DOI: 10.1007/978-981-10-8797-4_62
    BibTeX
    @incollection{Abhijith2019,
     author = {Abhijith, P. S. and Simon, Philomina},
     title = {Improved Blurred Image Splicing Localization with KNN Matting},
     booktitle = {Integrated Intelligent Computing, Communication and Security},
     publisher = {Springer},
     year = {2019}}
     
  3. F. Ahmed, F. Khelifi, A. Lawgalv & A. Bouridane
    Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification
    Proc. Safety and Sustainability (ICGS3) 2019 IEEE 12th Int. Conf. Global Security
    2019, pp. 1-6
    DOI: 10.1109/ICGS3.2019.8688260
    BibTeX
    @inproceedings{Ahmed2019a,
     author = {Ahmed, F. and Khelifi, F. and Lawgalv, A. and Bouridane, A.},
     title = {Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification},
     booktitle = {Proc. Safety and Sustainability (ICGS3) 2019 IEEE 12th Int. Conf. Global Security},
     year = {2019},
     pages = {1--6}}
     
  4. M.H. Al Banna, M. Ali Haider, M.J. Al Nahian, M.M. Islam, K.A. Taher & M.S. Kaiser
    Camera Model Identification using Deep CNN and Transfer Learning Approach
    Proc. Int. Conf. Robotics,Electrical and Signal Processing Techniques (ICREST)
    2019, pp. 626-630
    DOI: 10.1109/ICREST.2019.8644194
    BibTeX
    @inproceedings{AlBanna2019,
     author = {Al Banna, M. H. and Ali Haider, M. and Al Nahian, M. J. and Islam, M. M. and Taher, K. A. and Kaiser, M. S.},
     title = {Camera Model Identification using Deep CNN and Transfer Learning Approach},
     booktitle = {Proc. Int. Conf. Robotics,Electrical and Signal Processing Techniques (ICREST)},
     year = {2019},
     pages = {626--630}}
     
  5. G. Amato, F. Falchi, C. Gennaro, F.V. Massoli, N. Passalis, A. Tefas, A. Trivilini & C. Vairo
    Face Verification and Recognition for Digital Forensics and Information Security
    Proc. 7th Int. Symp. Digital Forensics and Security (ISDFS)
    2019, pp. 1-6
    DOI: 10.1109/ISDFS.2019.8757511
    BibTeX
    @inproceedings{Amato2019,
     author = {Amato, G. and Falchi, F. and Gennaro, C. and Massoli, F. V. and Passalis, N. and Tefas, A. and Trivilini, A. and Vairo, C.},
     title = {Face Verification and Recognition for Digital Forensics and Information Security},
     booktitle = {Proc. 7th Int. Symp. Digital Forensics and Security (ISDFS)},
     year = {2019},
     pages = {1--6}}
     
  6. I. Amerini, C. Li & R. Caldelli
    Social Network Identification Through Image Classification With CNN
    IEEE Access, 2019, Vol. 7, pp. 35264-35273
    DOI: 10.1109/ACCESS.2019.2903876
    BibTeX
    @article{Amerini2019,
     author = {Amerini, I. and Li, C. and Caldelli, R.},
     title = {Social Network Identification Through Image Classification With CNN},
     journal = {IEEE Access},
     year = {2019},
     volume = {7},
     pages = {35264--35273}}
     
  7. K. Anoop, M.P. Gangan, P. Deepak & V.L. Lajish
    Leveraging Heterogeneous Data for Fake News Detection
    Linking and Mining Heterogeneous and Multi-view Data
    Springer, 2019
    DOI: 10.1007/978-3-030-01872-6_10
    BibTeX
    @incollection{Anoop2019,
     author = {Anoop, K. and Gangan, Manjary P. and Deepak, P. and Lajish, V. L.},
     title = {Leveraging Heterogeneous Data for Fake News Detection},
     booktitle = {Linking and Mining Heterogeneous and Multi-view Data},
     publisher = {Springer},
     year = {2019}}
     
  8. M. Apte, G.K. Palshikar & S. Baskaran
    Frauds in Online Social Networks: A Review
    Social Networks and Surveillance for Society
    Springer, 2019
    DOI: 10.1007/978-3-319-78256-0_1
    BibTeX
    @incollection{Apte2019,
     author = {Apte, Manoj and Palshikar, Girish Keshav and Baskaran, Sriram},
     title = {Frauds in Online Social Networks: A Review},
     booktitle = {Social Networks and Surveillance for Society},
     publisher = {Springer},
     year = {2019}}
     
  9. K. Asghar, X. Sun, P.L. Rosin, M. Saddique, M. Hussain & Z. Habib
    Edge–texture feature-based image forgery detection with cross-dataset evaluation
    Machine Vision and Applications, Springer, 2019, pp. 1
    DOI: 10.1007/s00138-019-01048-2
    BibTeX
    @article{Asghar2019,
     author = {Asghar, Khurshid and Sun, Xianfang and Rosin, Paul L. and Saddique, Mubbashar and Hussain, Muhammad and Habib, Zulfiqar},
     title = {Edge–texture feature-based image forgery detection with cross-dataset evaluation},
     journal = {Machine Vision and Applications},
     publisher = {Springer},
     year = {2019},
     pages = {1}}
     
  10. J.H. Bappy, C. Simons, L. Nataraj, B.S. Manjunath & A.K. Roy-Chowdhury
    Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries
    IEEE Transactions on Image Processing, 2019, Vol. 28(7), pp. 3286-3300
    DOI: 10.1109/TIP.2019.2895466
    BibTeX
    @article{Bappy2019,
     author = {Bappy, J. H. and Simons, C. and Nataraj, L. and Manjunath, B. S. and Roy-Chowdhury, A. K.},
     title = {Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries},
     journal = {IEEE Transactions on Image Processing},
     year = {2019},
     volume = {28},
     number = {7},
     pages = {3286--3300}}
     
  11. M. Barni, K. Kallas, E. Nowroozi & B. Tondi
    On the Transferability of Adversarial Examples against CNN-based Image Forensics
    Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
    2019, pp. 8286-8290
    DOI: 10.1109/ICASSP.2019.8683772
    BibTeX
    @inproceedings{Barni2019,
     author = {Barni, M. and Kallas, K. and Nowroozi, E. and Tondi, B.},
     title = {On the Transferability of Adversarial Examples against CNN-based Image Forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics},
     year = {2019},
     pages = {8286--8290}}
     
  12. E.R. Bartusiak, S.K. Yarlagadda, D. Güera, P. Bestagini, S. Tubaro, F.M. Zhu & E.J. Delp
    Splicing Detection and Localization In Satellite Imagery Using Conditional GANs
    Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
    2019, pp. 91-96
    DOI: 10.1109/MIPR.2019.00024
    BibTeX
    @inproceedings{Bartusiak2019,
     author = {Bartusiak, E. R. and Yarlagadda, S. K. and Güera, D. and Bestagini, P. and Tubaro, S. and Zhu, F. M. and Delp, E. J.},
     title = {Splicing Detection and Localization In Satellite Imagery Using Conditional GANs},
     booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)},
     year = {2019},
     pages = {91--96}}
     
  13. M.S. Behare, A.S. Bhalchandra & R. Kumar
    Source Camera Identification using Photo Response Noise Uniformity
    Proc. Communication and Aerospace Technology (ICECA) 2019 3rd Int. conference Electronics
    2019, pp. 731-734
    DOI: 10.1109/ICECA.2019.8822212
    BibTeX
    @inproceedings{Behare2019,
     author = {Behare, M. S. and Bhalchandra, A. S. and Kumar, R.},
     title = {Source Camera Identification using Photo Response Noise Uniformity},
     booktitle = {Proc. Communication and Aerospace Technology (ICECA) 2019 3rd Int. conference Electronics},
     year = {2019},
     pages = {731--734}}
     
  14. K. Bolouri, A. Azmoodeh, A. Dehghantanha & M. Firouzmand
    Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform
    Handbook of Big Data and IoT Security
    Springer, 2019
    DOI: 10.1007/978-3-030-10543-3_9
    BibTeX
    @incollection{Bolouri2019,
     author = {Bolouri, Kimia and Azmoodeh, Amin and Dehghantanha, Ali and Firouzmand, Mohammad},
     title = {Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform},
     booktitle = {Handbook of Big Data and IoT Security},
     publisher = {Springer},
     year = {2019}}
     
  15. L. Bondi, P. Bestagini, F. Pérez-González & S. Tubaro
    Improving PRNU Compression Through Preprocessing, Quantization, and Coding
    IEEE Transactions on Information Forensics and Security, 2019, Vol. 14(3), pp. 608-620
    DOI: 10.1109/TIFS.2018.2859587
    BibTeX
    @article{Bondi2019,
     author = {Bondi, L. and Bestagini, P. and Pérez-González, F. and Tubaro, S.},
     title = {Improving PRNU Compression Through Preprocessing, Quantization, and Coding},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2019},
     volume = {14},
     number = {3},
     pages = {608--620}}
     
  16. V. Bruni, A. Salvi & D. Vitulano
    Joint Correlation Measurements for PRNU-Based Source Identification
    Computer Analysis of Images and Patterns, Springer, 2019
    DOI: 10.1007/978-3-030-29891-3_22
    BibTeX
    @article{Bruni2019,
     author = {Bruni, Vittoria and Salvi, Alessandra and Vitulano, Domenico},
     title = {Joint Correlation Measurements for PRNU-Based Source Identification},
     journal = {Computer Analysis of Images and Patterns},
     publisher = {Springer},
     year = {2019}}
     
  17. G. Cattaneo, U. Ferraro Petrillo, A.F. Abate, F. Narducci & S. Barra
    Achieving efficient source camera identification on Hadoop
    Multimedia Tools and Applications, Springer, 2019, pp. 1
    DOI: 10.1007/s11042-019-7561-0
    BibTeX
    @article{Cattaneo2019,
     author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Abate, Andrea F. and Narducci, Fabio and Barra, Silvio},
     title = {Achieving efficient source camera identification on Hadoop},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     pages = {1}}
     
  18. C. Chen, S. Mccloskey & J. Yu
    Analyzing Modern Camera Response Functions
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2019, pp. 1961-1969
    DOI: 10.1109/WACV.2019.00213
    BibTeX
    @inproceedings{Chen2019a,
     author = {Chen, C. and Mccloskey, S. and Yu, J.},
     title = {Analyzing Modern Camera Response Functions},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2019},
     pages = {1961--1969}}
     
  19. A.M. Das & S. Aji
    A Fast and Efficient Method for Image Splicing Localization Using BM3D Noise Estimation
    Integrated Intelligent Computing, Communication and Security
    Springer, 2019
    DOI: 10.1007/978-981-10-8797-4_65
    BibTeX
    @incollection{Das2019,
     author = {Das, Aswathy M. and Aji, S.},
     title = {A Fast and Efficient Method for Image Splicing Localization Using BM3D Noise Estimation},
     booktitle = {Integrated Intelligent Computing, Communication and Security},
     publisher = {Springer},
     year = {2019}}
     
  20. L. Debiasi, N. Damer, A.M. Saladié, C. Rathgeb, U. Scherhag, C. Busch, F. Kirchbuchner & A. Uhl
    On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
    Image Analysis and Processing – ICIAP 2019, Springer, 2019
    DOI: 10.1007/978-3-030-30645-8_32
    BibTeX
    @article{Debiasi2019a,
     author = {Debiasi, Luca and Damer, Naser and Saladié, Alexandra Moseguí­ and Rathgeb, Christian and Scherhag, Ulrich and Busch, Christoph and Kirchbuchner, Florian and Uhl, Andreas},
     title = {On the Detection of GAN-Based Face Morphs Using Established Morph Detectors},
     journal = {Image Analysis and Processing – ICIAP 2019},
     publisher = {Springer},
     year = {2019}}
     
  21. L. Debiasi, E. Leitet, K. Norell, T. Tachos & A. Uhl
    Blind Source Camera Clustering of Criminal Case Data
    Proc. 7th Int. Workshop Biometrics and Forensics (IWBF)
    2019, pp. 1-6
    DOI: 10.1109/IWBF.2019.8739171
    BibTeX
    @inproceedings{Debiasi2019,
     author = {Debiasi, L. and Leitet, E. and Norell, K. and Tachos, T. and Uhl, A.},
     title = {Blind Source Camera Clustering of Criminal Case Data},
     booktitle = {Proc. 7th Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2019},
     pages = {1--6}}
     
  22. B. Diallo, T. Urruty, P. Bourdon & C. Fernandez-Maloigne
    Improving Robustness of Image Tampering Detection for Compression
    MultiMedia Modeling, Springer, 2019
    DOI: 10.1007/978-3-030-05710-7_32
    BibTeX
    @article{Diallo2019,
     author = {Diallo, Boubacar and Urruty, Thierry and Bourdon, Pascal and Fernandez-Maloigne, Christine},
     title = {Improving Robustness of Image Tampering Detection for Compression},
     journal = {MultiMedia Modeling},
     publisher = {Springer},
     year = {2019}}
     
  23. F. Ding, Y. Shi, G. Zhu & Y.-q. Shi
    Real-time estimation for the parameters of Gaussian filtering via deep learning
    Journal of Real-Time Image Processing, Springer, 2019, pp. 1
    DOI: 10.1007/s11554-019-00907-5
    BibTeX
    @article{Ding2019a,
     author = {Ding, Feng and Shi, Yuxi and Zhu, Guopu and Shi, Yun-qing},
     title = {Real-time estimation for the parameters of Gaussian filtering via deep learning},
     journal = {Journal of Real-Time Image Processing},
     publisher = {Springer},
     year = {2019},
     pages = {1}}
     
  24. X. Ding, Y. Chen, Z. Tang & Y. Huang
    Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning
    #IEEE_O_ACC#, 2019, Vol. 7, pp. 25878-25890
    DOI: 10.1109/ACCESS.2019.2897360
    BibTeX
    @article{Ding2019,
     author = {Ding, X. and Chen, Y. and Tang, Z. and Huang, Y.},
     title = {Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning},
     journal = {#IEEE_O_ACC#},
     year = {2019},
     volume = {7},
     pages = {25878--25890}}
     
  25. A. Doegar, M. Dutta & G. Kumar
    A Review of Passive Image Cloning Detection Approaches
    Proceedings of 2nd International Conference on Communication, Computing and Networking
    Springer, 2019
    DOI: 10.1007/978-981-13-1217-5_46
    BibTeX
    @incollection{Doegar2019,
     author = {Doegar, Amit and Dutta, Maitreyee and Kumar, Gaurav},
     title = {A Review of Passive Image Cloning Detection Approaches},
     booktitle = {Proceedings of 2nd International Conference on Communication, Computing and Networking},
     publisher = {Springer},
     year = {2019}}
     
  26. B. Elhaminia, A. Harati & A. Taherinia
    A probabilistic framework for copy-move forgery detection based on Markov Random Field
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(18), pp. 25591
    DOI: 10.1007/s11042-019-7713-2
    BibTeX
    @article{Elhaminia2019,
     author = {Elhaminia, Behnaz and Harati, Ahad and Taherinia, Amirhossein},
     title = {A probabilistic framework for copy-move forgery detection based on Markov Random Field},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {18},
     pages = {25591}}
     
  27. Z.F. Elsharkawy, S.A.S. Abdelwahab, F.E. Abd El-Samie, M. Dessouky & S. Elaraby
    New and efficient blind detection algorithm for digital image forgery using homomorphic image processing
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(15), pp. 21585
    DOI: 10.1007/s11042-019-7206-3
    BibTeX
    @article{Elsharkawy2019,
     author = {Elsharkawy, Zeinab F. and Abdelwahab, Safey A. S. and Abd El-Samie, Fathi E. and Dessouky, Moawad and Elaraby, Sayed},
     title = {New and efficient blind detection algorithm for digital image forgery using homomorphic image processing},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {15},
     pages = {21585}}
     
  28. H. Gao, M. Hu, T. Gao & R. Cheng
    Robust detection of median filtering based on combined features of difference image
    Signal Processing: Image Communication, Elsevier BV, 2019, Vol. 72, pp. 126-133
    DOI: 10.1016/j.image.2018.12.014
    BibTeX
    @article{Gao2019,
     author = {Gao, Hang and Hu, Mengting and Gao, Tiegang and Cheng, Renhong},
     title = {Robust detection of median filtering based on combined features of difference image},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2019},
     volume = {72},
     pages = {126--133}}
     
  29. H. Guan, M. Kozak, E. Robertson, Y. Lee, A.N. Yates, A. Delgado, D. Zhou, T. Kheyrkhah, J. Smith & J. Fiscus
    MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation
    Proc. IEEE Winter Applications of Computer Vision Workshops (WACVW)
    2019, pp. 63-72
    DOI: 10.1109/WACVW.2019.00018
    BibTeX
    @inproceedings{Guan2019,
     author = {Guan, H. and Kozak, M. and Robertson, E. and Lee, Y. and Yates, A. N. and Delgado, A. and Zhou, D. and Kheyrkhah, T. and Smith, J. and Fiscus, J.},
     title = {MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation},
     booktitle = {Proc. IEEE Winter Applications of Computer Vision Workshops (WACVW)},
     year = {2019},
     pages = {63--72}}
     
  30. M. Gupta & P. Goyal
    Detecting Image Forgery in Single-Sensor Multispectral Images
    Soft Computing for Problem Solving
    Springer, 2019
    DOI: 10.1007/978-981-13-1592-3_67
    BibTeX
    @incollection{Gupta2019,
     author = {Gupta, Mridul and Goyal, Puneet},
     title = {Detecting Image Forgery in Single-Sensor Multispectral Images},
     booktitle = {Soft Computing for Problem Solving},
     publisher = {Springer},
     year = {2019}}
     
  31. B. Hadwiger, D. Baracchi, A. Piva & C. Riess
    Towards Learned Color Representations for Image Splicing Detection
    Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
    2019, pp. 8281-8285
    DOI: 10.1109/ICASSP.2019.8682246
    BibTeX
    @inproceedings{Hadwiger2019,
     author = {Hadwiger, B. and Baracchi, D. and Piva, A. and Riess, C.},
     title = {Towards Learned Color Representations for Image Splicing Detection},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics},
     year = {2019},
     pages = {8281--8285}}
     
  32. P. He, H. Li & H. Wang
    Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2019, pp. 2299-2303
    DOI: 10.1109/ICIP.2019.8803740
    BibTeX
    @inproceedings{He2019,
     author = {He, P. and Li, H. and Wang, H.},
     title = {Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2019},
     pages = {2299--2303}}
     
  33. B. Hosler, O. Mayer, B. Bayar, X. Zhao, C. Chen, J.A. Shackleford & M.C. Stamm
    A Video Camera Model Identification System Using Deep Learning and Fusion
    Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
    2019, pp. 8271-8275
    DOI: 10.1109/ICASSP.2019.8682608
    BibTeX
    @inproceedings{Hosler2019,
     author = {Hosler, B. and Mayer, O. and Bayar, B. and Zhao, X. and Chen, C. and Shackleford, J. A. and Stamm, M. C.},
     title = {A Video Camera Model Identification System Using Deep Learning and Fusion},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics},
     year = {2019},
     pages = {8271--8275}}
     
  34. B.C. Hosler, X. Zhao, O. Mayer, C. Chen, J.A. Shackleford & M.C. Stamm
    The Video Authentication and Camera Identification Database: A New Database for Video Forensics
    IEEE Access, 2019, Vol. 7, pp. 76937-76948
    DOI: 10.1109/ACCESS.2019.2922145
    BibTeX
    @article{Hosler2019a,
     author = {Hosler, B. C. and Zhao, X. and Mayer, O. and Chen, C. and Shackleford, J. A. and Stamm, M. C.},
     title = {The Video Authentication and Camera Identification Database: A New Database for Video Forensics},
     journal = {IEEE Access},
     year = {2019},
     volume = {7},
     pages = {76937--76948}}
     
  35. M.D.M. Hosseini & M. Kirchner
    Unsupervised Image Manipulation Localization With Non-Binary Label Attribution
    IEEE Signal Processing Letters, 2019, Vol. 26(7), pp. 976-980
    DOI: 10.1109/LSP.2019.2913530
    BibTeX
    @article{Hosseini2019,
     author = {Hosseini, M. D. M. and Kirchner, M.},
     title = {Unsupervised Image Manipulation Localization With Non-Binary Label Attribution},
     journal = {IEEE Signal Processing Letters},
     year = {2019},
     volume = {26},
     number = {7},
     pages = {976--980}}
     
  36. A.K. Jaiswal & R. Srivastava
    Copy-Move Forgery Detection Using Shift-Invariant SWT and Block Division Mean Features
    Recent Trends in Communication, Computing, and Electronics
    Springer, 2019
    DOI: 10.1007/978-981-13-2685-1_28
    BibTeX
    @incollection{Jaiswal2019,
     author = {Jaiswal, Ankit Kumar and Srivastava, Rajeev},
     title = {Copy-Move Forgery Detection Using Shift-Invariant SWT and Block Division Mean Features},
     booktitle = {Recent Trends in Communication, Computing, and Electronics},
     publisher = {Springer},
     year = {2019}}
     
  37. P.R.M. Júnior, L. Bondi, P. Bestagini, A. Rocha & S. Tubaro
    A Prnu-Based Method to Expose Video Device Compositions in Open-Set Setups
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2019, pp. 96-100
    DOI: 10.1109/ICIP.2019.8802981
    BibTeX
    @inproceedings{Junior2019,
     author = {Júnior, P. R. M. and Bondi, L. and Bestagini, P. and Rocha, A. and Tubaro, S.},
     title = {A Prnu-Based Method to Expose Video Device Compositions in Open-Set Setups},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2019},
     pages = {96--100}}
     
  38. P.R.M. Júnior, L. Bondi, P. Bestagini, S. Tubaro & A. Rocha
    An In-Depth Study on Open-Set Camera Model Identification
    IEEE Access, 2019, pp. 1
    DOI: 10.1109/ACCESS.2019.2921436
    BibTeX
    @article{Junior2019b,
     author = {Júnior, P. R. M. and Bondi, L. and Bestagini, P. and Tubaro, S. and Rocha, A.},
     title = {An In-Depth Study on Open-Set Camera Model Identification},
     journal = {IEEE Access},
     year = {2019},
     pages = {1}}
     
  39. N. Kanwal, A. Girdhar, L. Kaur & J.S. Bhullar
    Detection of Digital Image Forgery using Fast Fourier Transform and Local Features
    Proc. Computational and Technology Management (ICACTM) 2019 Int. Conf. Automation
    2019, pp. 262-267
    DOI: 10.1109/ICACTM.2019.8776709
    BibTeX
    @inproceedings{Kanwal2019,
     author = {Kanwal, N. and Girdhar, A. and Kaur, L. and Bhullar, J. S.},
     title = {Detection of Digital Image Forgery using Fast Fourier Transform and Local Features},
     booktitle = {Proc. Computational and Technology Management (ICACTM) 2019 Int. Conf. Automation},
     year = {2019},
     pages = {262--267}}
     
  40. R.S. Khalaf & A. Varol
    Digital Forensics: Focusing on Image Forensics
    Proc. 7th Int. Symp. Digital Forensics and Security (ISDFS)
    2019, pp. 1-5
    DOI: 10.1109/ISDFS.2019.8757557
    BibTeX
    @inproceedings{Khalaf2019,
     author = {Khalaf, R. S. and Varol, A.},
     title = {Digital Forensics: Focusing on Image Forensics},
     booktitle = {Proc. 7th Int. Symp. Digital Forensics and Security (ISDFS)},
     year = {2019},
     pages = {1--5}}
     
  41. O. Kliuiev, M. Mozhaiev, O. Uhrovetskyi, O. Mozhaiev & E. Simakova-Yefremian
    Method of Forensic Research on Image for Finding Touch up on the Basis of Noise Entropy
    Proc. 3rd Int. Conf. Advanced Information and Communications Technologies (AICT)
    2019, pp. 76-79
    DOI: 10.1109/AIACT.2019.8847760
    BibTeX
    @inproceedings{Kliuiev2019,
     author = {Kliuiev, O. and Mozhaiev, M. and Uhrovetskyi, O. and Mozhaiev, O. and Simakova-Yefremian, E.},
     title = {Method of Forensic Research on Image for Finding Touch up on the Basis of Noise Entropy},
     booktitle = {Proc. 3rd Int. Conf. Advanced Information and Communications Technologies (AICT)},
     year = {2019},
     pages = {76--79}}
     
  42. A. Kumar, C.S. Prakash, S. Maheshkar & V. Maheshkar
    Markov Feature Extraction Using Enhanced Threshold Method for Image Splicing Forgery Detection
    Smart Innovations in Communication and Computational Sciences
    Springer, 2019
    DOI: 10.1007/978-981-10-8971-8_2
    BibTeX
    @incollection{Kumar2019,
     author = {Kumar, Avinash and Prakash, Choudhary Shyam and Maheshkar, Sushila and Maheshkar, Vikas},
     title = {Markov Feature Extraction Using Enhanced Threshold Method for Image Splicing Forgery Detection},
     booktitle = {Smart Innovations in Communication and Computational Sciences},
     publisher = {Springer},
     year = {2019}}
     
  43. C. Lin, W. Lu, X. Huang, K. Liu, W. Sun & H. Lin
    Region duplication detection based on hybrid feature and evaluative clustering
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(15), pp. 20739
    DOI: 10.1007/s11042-019-7342-9
    BibTeX
    @article{Lin2019,
     author = {Lin, Cong and Lu, Wei and Huang, Xinchao and Liu, Ke and Sun, Wei and Lin, Hanhui},
     title = {Region duplication detection based on hybrid feature and evaluative clustering},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {15},
     pages = {20739}}
     
  44. K. Liu, W. Lu, C. Lin, X. Huang, X. Liu, Y. Yeung & Y. Xue
    Copy move forgery detection based on keypoint and patch match
    Multimedia Tools and Applications, Springer, 2019, pp. 1
    DOI: 10.1007/s11042-019-07930-5
    BibTeX
    @article{Liu2019e,
     author = {Liu, Ke and Lu, Wei and Lin, Cong and Huang, Xinchao and Liu, Xianjin and Yeung, Yuileong and Xue, Yingjie},
     title = {Copy move forgery detection based on keypoint and patch match},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     pages = {1}}
     
  45. X. Liu, W. Lu, Q. Zhang, J. Huang & Y. Shi
    Downscaling Factor Estimation on Pre-JPEG Compressed Images
    IEEE Transactions on Circuits and Systems for Video Technology, 2019, pp. 1
    DOI: 10.1109/TCSVT.2019.2893353
    BibTeX
    @article{Liu2019,
     author = {Liu, X. and Lu, W. and Zhang, Q. and Huang, J. and Shi, Y.},
     title = {Downscaling Factor Estimation on Pre-JPEG Compressed Images},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2019},
     pages = {1}}
     
  46. Y. Liu, H. Wang, Y. Chen, H. Wu & H. Wang
    A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering
    Multimedia Tools and Applications, Springer, 2019, pp. 1
    DOI: 10.1007/s11042-019-08044-8
    BibTeX
    @article{Liu2019c,
     author = {Liu, Yong and Wang, Hongxia and Chen, Yi and Wu, Hanzhou and Wang, Huan},
     title = {A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     pages = {1}}
     
  47. Y. Liu, X. Zhu, X. Zhao & Y. Cao
    Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution
    IEEE Transactions on Information Forensics and Security, 2019, Vol. 14(10), pp. 2551-2566
    DOI: 10.1109/TIFS.2019.2902826
    BibTeX
    @article{Liu2019a,
     author = {Liu, Y. and Zhu, X. and Zhao, X. and Cao, Y.},
     title = {Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2019},
     volume = {14},
     number = {10},
     pages = {2551--2566}}
     
  48. S. Luo, A. Peng, H. Zeng, X. Kang & L. Liu
    Deep Residual Learning Using Data Augmentation for Median Filtering Forensics of Digital Images
    IEEE Access, 2019, Vol. 7, pp. 80614-80621
    DOI: 10.1109/ACCESS.2019.2923000
    BibTeX
    @article{Luo2019,
     author = {Luo, S. and Peng, A. and Zeng, H. and Kang, X. and Liu, L.},
     title = {Deep Residual Learning Using Data Augmentation for Median Filtering Forensics of Digital Images},
     journal = {IEEE Access},
     year = {2019},
     volume = {7},
     pages = {80614--80621}}
     
  49. V. Mahale, M.M.H. Ali, P.L. Yannawar & A. Gaikwad
    Analysis of Image Inconsistency Based on Discrete Cosine Transform (DCT)
    Information and Communication Technology for Intelligent Systems
    Springer, 2019
    DOI: 10.1007/978-981-13-1742-2_56
    BibTeX
    @incollection{Mahale2019,
     author = {Mahale, Vivek and Ali, Mouad M. H. and Yannawar, Pravin L. and Gaikwad, Ashok},
     title = {Analysis of Image Inconsistency Based on Discrete Cosine Transform (DCT)},
     booktitle = {Information and Communication Technology for Intelligent Systems},
     publisher = {Springer},
     year = {2019}}
     
  50. F. Marra, D. Gragnaniello, L. Verdoliva & G. Poggi
    Do GANs Leave Artificial Fingerprints?
    Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
    2019, pp. 506-511
    DOI: 10.1109/MIPR.2019.00103
    BibTeX
    @inproceedings{Marra2019,
     author = {Marra, F. and Gragnaniello, D. and Verdoliva, L. and Poggi, G.},
     title = {Do GANs Leave Artificial Fingerprints?},
     booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)},
     year = {2019},
     pages = {506--511}}
     
  51. F. Matern, C. Riess & M. Stamminger
    Gradient-Based Illumination Description for Image Forgery Detection
    IEEE Transactions on Information Forensics and Security, 2019, pp. 1
    DOI: 10.1109/TIFS.2019.2935913
    BibTeX
    @article{Matern2019,
     author = {Matern, F. and Riess, C. and Stamminger, M.},
     title = {Gradient-Based Illumination Description for Image Forgery Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2019},
     pages = {1}}
     
  52. R. Matthews, M. Sorrel & N. Falkner
    Determining Image Sensor Temperature Using Dark Current
    arXiv, 2019
    arXiv: http://arxiv.org/abs/1901.02113v1
    BibTeX
    @article{Matthews2019,
     author = {Matthews, Richard and Sorrel, Matthew and Falkner, Nickolas},
     title = {Determining Image Sensor Temperature Using Dark Current},
     journal = {arXiv},
     year = {2019}}
     
  53. O. Mayer & M.C. Stamm
    Forensic Similarity for Digital Images
    IEEE Transactions on Information Forensics and Security, 2019, pp. 1
    DOI: 10.1109/TIFS.2019.2924552
    BibTeX
    @article{Mayer2019,
     author = {Mayer, O. and Stamm, M. C.},
     title = {Forensic Similarity for Digital Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2019},
     pages = {1}}
     
  54. A. Mazumdar & P.K. Bora
    Deep Learning-Based Classification of Illumination Maps for Exposing Face Splicing Forgeries in Images
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2019, pp. 116-120
    DOI: 10.1109/ICIP.2019.8802969
    BibTeX
    @inproceedings{Mazumdar2019,
     author = {Mazumdar, A. and Bora, P. K.},
     title = {Deep Learning-Based Classification of Illumination Maps for Exposing Face Splicing Forgeries in Images},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2019},
     pages = {116--120}}
     
  55. K.B. Meena & V. Tyagi
    Methods to Distinguish Photorealistic Computer Generated Images from Photographic Images: A Review
    Advances in Computing and Data Sciences
    Springer, 2019
    DOI: 10.1007/978-981-13-9939-8_7
    BibTeX
    @incollection{Meena2019,
     author = {Meena, Kunj Bihari and Tyagi, Vipin},
     title = {Methods to Distinguish Photorealistic Computer Generated Images from Photographic Images: A Review},
     booktitle = {Advances in Computing and Data Sciences},
     publisher = {Springer},
     year = {2019}}
     
  56. K.B. Meena & V. Tyagi
    A copy-move image forgery detection technique based on Gaussian-Hermite moments
    Multimedia Tools and Applications, Springer, 2019, pp. 1
    DOI: 10.1007/s11042-019-08082-2
    BibTeX
    @article{Meena2019a,
     author = {Meena, Kunj Bihari and Tyagi, Vipin},
     title = {A copy-move image forgery detection technique based on Gaussian-Hermite moments},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     pages = {1}}
     
  57. Y. Mirsky, T. Mahler, I. Shelef & Y. Elovici
    CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
    ArXiv, 2019
    arXiv: http://arxiv.org/abs/1901.03597v3
    BibTeX
    @article{Mirsky2019,
     author = {Mirsky, Yisroel and Mahler, Tom and Shelef, Ilan and Elovici, Yuval},
     title = {CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning},
     journal = {ArXiv},
     year = {2019}}
     
  58. M. Mohanty, M. Zhang, M.R. Asghar & G. Russello
    e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy
    #IEEE_J_DSC#, 2019, pp. 1
    DOI: 10.1109/TDSC.2019.2892448
    BibTeX
    @article{Mohanty2019,
     author = {Mohanty, M. and Zhang, M. and Asghar, M. R. and Russello, G.},
     title = {e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy},
     journal = {#IEEE_J_DSC#},
     year = {2019},
     pages = {1}}
     
  59. M. Mohanty, M. Zhang & G. Russello
    A Photo Forensics-Based Prototype to Combat Revenge Porn
    Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
    2019, pp. 5-8
    DOI: 10.1109/MIPR.2019.00009
    BibTeX
    @inproceedings{Mohanty2019a,
     author = {Mohanty, M. and Zhang, M. and Russello, G.},
     title = {A Photo Forensics-Based Prototype to Combat Revenge Porn},
     booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)},
     year = {2019},
     pages = {5--8}}
     
  60. M. Mokhtari Ardakan, M. Yerokh & M. Akhavan Saffar
    A New Method to Copy-Move Forgery Detection in Digital Images Using Gabor Filter
    Fundamental Research in Electrical Engineering
    Springer, 2019
    DOI: 10.1007/978-981-10-8672-4_9
    BibTeX
    @incollection{MokhtariArdakan2019,
     author = {Mokhtari Ardakan, Mostafa and Yerokh, Masoud and Akhavan Saffar, Mostafa},
     title = {A New Method to Copy-Move Forgery Detection in Digital Images Using Gabor Filter},
     booktitle = {Fundamental Research in Electrical Engineering},
     publisher = {Springer},
     year = {2019}}
     
  61. S. Nam, W. Ahn, S. Mun, J. Park, D. Kim, I. Yu & H. Lee
    Content-Aware Image Resizing Detection Using Deep Neural Network
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2019, pp. 106-110
    DOI: 10.1109/ICIP.2019.8802946
    BibTeX
    @inproceedings{Nam2019,
     author = {Nam, S. and Ahn, W. and Mun, S. and Park, J. and Kim, D. and Yu, I. and Lee, H.},
     title = {Content-Aware Image Resizing Detection Using Deep Neural Network},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2019},
     pages = {106--110}}
     
  62. G. Nirmala & K.K. Thyagharajan
    A Modern Approach for Image Forgery Detection using BRICH Clustering based on Normalised Mean and Standard Deviation
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2019, pp. 0441-0444
    DOI: 10.1109/ICCSP.2019.8697951
    BibTeX
    @inproceedings{Nirmala2019,
     author = {Nirmala, G. and Thyagharajan, K. K.},
     title = {A Modern Approach for Image Forgery Detection using BRICH Clustering based on Normalised Mean and Standard Deviation},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2019},
     pages = {0441--0444}}
     
  63. A. Pavlović, N. Glišović, A. Gavrovska & I. Reljin
    Copy-move forgery detection based on multifractals
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(15), pp. 20655
    DOI: 10.1007/s11042-019-7277-1
    BibTeX
    @article{Pavlovic2019,
     author = {Pavlović, Aleksandra and Glišović, Natasa and Gavrovska, Ana and Reljin, Irini},
     title = {Copy-move forgery detection based on multifractals},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {15},
     pages = {20655}}
     
  64. Q. Phan, G. Boato, R. Caldelli & I. Amerini
    Tracking Multiple Image Sharing on Social Networks
    Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
    2019, pp. 8266-8270
    DOI: 10.1109/ICASSP.2019.8683144
    BibTeX
    @inproceedings{Phan2019,
     author = {Phan, Q. and Boato, G. and Caldelli, R. and Amerini, I.},
     title = {Tracking Multiple Image Sharing on Social Networks},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics},
     year = {2019},
     pages = {8266--8270}}
     
  65. C.S. Prakash, P.P. Panzade, H. Om & S. Maheshkar
    Detection of copy-move forgery using AKAZE and SIFT keypoint extraction
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(16), pp. 23535
    DOI: 10.1007/s11042-019-7629-x
    BibTeX
    @article{Prakash2019,
     author = {Prakash, Choudhary Shyam and Panzade, Prajwal Pralhad and Om, Hari and Maheshkar, Sushila},
     title = {Detection of copy-move forgery using AKAZE and SIFT keypoint extraction},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {16},
     pages = {23535}}
     
  66. V. Rajput & I.A. Ansari
    Image tamper detection and self-recovery using multiple median watermarking
    Multimedia Tools and Applications, Springer, 2019, pp. 1
    DOI: 10.1007/s11042-019-07971-w
    BibTeX
    @article{Rajput2019,
     author = {Rajput, Vishal and Ansari, Irshad Ahmad},
     title = {Image tamper detection and self-recovery using multiple median watermarking},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     pages = {1}}
     
  67. K.H. Rhee
    Improvement Feature Vector: Autoregressive Model of Median Filter Residual
    IEEE Access, 2019, Vol. 7, pp. 77524-77540
    DOI: 10.1109/ACCESS.2019.2921573
    BibTeX
    @article{Rhee2019a,
     author = {Rhee, K. H.},
     title = {Improvement Feature Vector: Autoregressive Model of Median Filter Residual},
     journal = {IEEE Access},
     year = {2019},
     volume = {7},
     pages = {77524--77540}}
     
  68. R. Rouhi, F. Bertini, D. Montesi, X. Lin, Y. Quan & C. Li
    Hybrid Clustering of Shared Images on Social Networks for Digital Forensics
    IEEE Access, 2019, Vol. 7, pp. 87288-87302
    DOI: 10.1109/ACCESS.2019.2925102
    BibTeX
    @article{Rouhi2019,
     author = {Rouhi, R. and Bertini, F. and Montesi, D. and Lin, X. and Quan, Y. and Li, C.},
     title = {Hybrid Clustering of Shared Images on Social Networks for Digital Forensics},
     journal = {IEEE Access},
     year = {2019},
     volume = {7},
     pages = {87288--87302}}
     
  69. P. Roy & S. Bag
    Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration
    Proc. and Behavior Analysis (ISBA) 2019 IEEE 5th Int. Conf. Identity, Security
    2019, pp. 1-9
    DOI: 10.1109/ISBA.2019.8778490
    BibTeX
    @inproceedings{Roy2019,
     author = {Roy, P. and Bag, S.},
     title = {Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration},
     booktitle = {Proc. and Behavior Analysis (ISBA) 2019 IEEE 5th Int. Conf. Identity, Security},
     year = {2019},
     pages = {1--9}}
     
  70. W. Shan, Y. Yi, J. Qiu & A. Yin
    Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion
    #IEEE_O_ACC#, 2019, Vol. 7, pp. 17174-17183
    DOI: 10.1109/ACCESS.2019.2894981
    BibTeX
    @article{Shan2019,
     author = {Shan, W. and Yi, Y. and Qiu, J. and Yin, A.},
     title = {Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion},
     journal = {#IEEE_O_ACC#},
     year = {2019},
     volume = {7},
     pages = {17174--17183}}
     
  71. T.M. Shashidhar & K.B. Ramesh
    FARIP: Framework for Artifact Removal for Image Processing Using JPEG
    Artificial Intelligence and Algorithms in Intelligent Systems
    Springer, 2019
    DOI: 10.1007/978-3-319-91189-2_2
    BibTeX
    @incollection{Shashidhar2019,
     author = {Shashidhar, T. M. and Ramesh, K. B.},
     title = {FARIP: Framework for Artifact Removal for Image Processing Using JPEG},
     booktitle = {Artificial Intelligence and Algorithms in Intelligent Systems},
     publisher = {Springer},
     year = {2019}}
     
  72. N. Siddiqui, S.S. Moin & S. Islam
    Analysis of Denoising Filters for Source Identification Using PRNU Features
    Soft Computing and Signal Processing
    Springer, 2019
    DOI: 10.1007/978-981-13-3600-3_62
    BibTeX
    @incollection{Siddiqui2019,
     author = {Siddiqui, Nadia and Moin, Syeda Shira and Islam, Saiful},
     title = {Analysis of Denoising Filters for Source Identification Using PRNU Features},
     booktitle = {Soft Computing and Signal Processing},
     publisher = {Springer},
     year = {2019}}
     
  73. K. Singh, A. Kansal & G. Singh
    An improved median filtering anti-forensics with better image quality and forensic undetectability
    Multidimensional Systems and Signal Processing, Springer, 2019, Vol. 30(4), pp. 1951
    DOI: 10.1007/s11045-019-00637-8
    BibTeX
    @article{Singh2019,
     author = {Singh, Kulbir and Kansal, Ankush and Singh, Gurinder},
     title = {An improved median filtering anti-forensics with better image quality and forensic undetectability},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2019},
     volume = {30},
     number = {4},
     pages = {1951}}
     
  74. B. Soni, P.K. Das & D.M. Thounaojam
    Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features
    Journal of Information Security and Applications, Elsevier BV, 2019, Vol. 45, pp. 44-51
    DOI: 10.1016/j.jisa.2019.01.007
    BibTeX
    @article{Soni2019,
     author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei},
     title = {Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features},
     journal = {Journal of Information Security and Applications},
     publisher = {Elsevier BV},
     year = {2019},
     volume = {45},
     pages = {44--51}}
     
  75. M. Sridevi, S. Aishwarya, A. Nidheesha & D. Bokadia
    Parallel Image Forgery Detection Using FREAK Descriptor
    Information and Communication Technology for Intelligent Systems
    Springer, 2019
    DOI: 10.1007/978-981-13-1747-7_61
    BibTeX
    @incollection{Sridevi2019,
     author = {Sridevi, M. and Aishwarya, S. and Nidheesha, Amedapu and Bokadia, Divyansh},
     title = {Parallel Image Forgery Detection Using FREAK Descriptor},
     booktitle = {Information and Communication Technology for Intelligent Systems},
     publisher = {Springer},
     year = {2019}}
     
  76. A. Tambo, M. Albright & S. Mccloskey
    Low-and Semantic-Level Cues for Forensic Splice Detection
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2019, pp. 1664-1672
    DOI: 10.1109/WACV.2019.00182
    BibTeX
    @inproceedings{Tambo2019,
     author = {Tambo, A. and Albright, M. and Mccloskey, S.},
     title = {Low-and Semantic-Level Cues for Forensic Splice Detection},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2019},
     pages = {1664--1672}}
     
  77. A. Tambo, M. Albright & S. Mccloskey
    Low-and Semantic-Level Cues for Forensic Splice Detection
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2019, pp. 1664-1672
    DOI: 10.1109/WACV.2019.00182
    BibTeX
    @inproceedings{Tambo2019a,
     author = {Tambo, A. and Albright, M. and Mccloskey, S.},
     title = {Low-and Semantic-Level Cues for Forensic Splice Detection},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2019},
     pages = {1664--1672}}
     
  78. D.B. Tariang, R.S. Chakraborty & R. Naskar
    A Robust Residual Dense Neural Network For Countering Antiforensic Attack on Median Filtered Images
    #IEEE_J_SPL#, 2019, Vol. 26(8), pp. 1132-1136
    DOI: 10.1109/LSP.2019.2922498
    BibTeX
    @article{Tariang2019,
     author = {Tariang, D. B. and Chakraborty, R. S. and Naskar, R.},
     title = {A Robust Residual Dense Neural Network For Countering Antiforensic Attack on Median Filtered Images},
     journal = {#IEEE_J_SPL#},
     year = {2019},
     volume = {26},
     number = {8},
     pages = {1132--1136}}
     
  79. M. Tiwari & B. Gupta
    Enhancing Source Camera Identification Using Weighted Nuclear Norm Minimization De-Noising Filter
    Advances in Computer Communication and Computational Sciences
    Springer, 2019
    DOI: 10.1007/978-981-13-0344-9_24
    BibTeX
    @incollection{Tiwari2019,
     author = {Tiwari, Mayank and Gupta, Bhupendra},
     title = {Enhancing Source Camera Identification Using Weighted Nuclear Norm Minimization De-Noising Filter},
     booktitle = {Advances in Computer Communication and Computational Sciences},
     publisher = {Springer},
     year = {2019}}
     
  80. D. Vaishnavi, G.N. Balaji & D. Mahalakshmi
    KAZE Feature Based Passive Image Forgery Detection
    First International Conference on Artificial Intelligence and Cognitive Computing
    Springer, 2019
    DOI: 10.1007/978-981-13-1580-0_32
    BibTeX
    @incollection{Vaishnavi2019,
     author = {Vaishnavi, D. and Balaji, G. N. and Mahalakshmi, D.},
     title = {KAZE Feature Based Passive Image Forgery Detection},
     booktitle = {First International Conference on Artificial Intelligence and Cognitive Computing},
     publisher = {Springer},
     year = {2019}}
     
  81. D. Vaishnavi & T.S. Subashini
    Application of local invariant symmetry features to detect and localize image copy move forgeries
    Journal of Information Security and Applications, Elsevier BV, 2019, Vol. 44, pp. 23-31
    DOI: 10.1016/j.jisa.2018.11.001
    BibTeX
    @article{Vaishnavi2019a,
     author = {Vaishnavi, D. and Subashini, T. S.},
     title = {Application of local invariant symmetry features to detect and localize image copy move forgeries},
     journal = {Journal of Information Security and Applications},
     publisher = {Elsevier BV},
     year = {2019},
     volume = {44},
     pages = {23--31}}
     
  82. A.N. Vasquez, D. María Ballesteros & D. Renza
    Machine learning applied to speaker verification of fake voice recordings
    Proc. Signal Processing and Artificial Vision (STSIVA) 2019 XXII Symp. Image
    2019, pp. 1-4
    DOI: 10.1109/STSIVA.2019.8730273
    BibTeX
    @inproceedings{Vasquez2019,
     author = {Vasquez, A. N. and María Ballesteros, D. and Renza, D.},
     title = {Machine learning applied to speaker verification of fake voice recordings},
     booktitle = {Proc. Signal Processing and Artificial Vision (STSIVA) 2019 XXII Symp. Image},
     year = {2019},
     pages = {1--4}}
     
  83. J. Wang, G. Wu, J. Li & S.K. Jha
    A new method estimating linear gaussian filter kernel by image PRNU noise
    Journal of Information Security and Applications, Elsevier BV, 2019, Vol. 44, pp. 1-11
    DOI: 10.1016/j.jisa.2018.11.002
    BibTeX
    @article{Wang2019,
     author = {Wang, Jinwei and Wu, Guojing and Li, Jian and Jha, Sunil Kr.},
     title = {A new method estimating linear gaussian filter kernel by image PRNU noise},
     journal = {Journal of Information Security and Applications},
     publisher = {Elsevier BV},
     year = {2019},
     volume = {44},
     pages = {1--11}}
     
  84. N.B.A. Warif, M.Y.I. Idris, A.W.A. Wahab, R. Salleh & A. Ismail
    CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
    Forensic Science International, Elsevier BV, 2019, Vol. 295, pp. 83-99
    DOI: 10.1016/j.forsciint.2018.12.004
    BibTeX
    @article{Warif2019,
     author = {Warif, Nor Bakiah Abd. and Idris, Mohd. Yamani Idna and Wahab, Ainuddin Wahid Abdul and Salleh, Rosli and Ismail, Ahsiah},
     title = {CMF-iteMS: An automatic threshold selection for detection of copy-move forgery},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2019},
     volume = {295},
     pages = {83--99}}
     
  85. W. Wei, X. Fan, H. Song & H. Wang
    Video tamper detection based on multi-scale mutual information
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(19), pp. 27109
    DOI: 10.1007/s11042-017-5083-1
    BibTeX
    @article{Wei2019,
     author = {Wei, Wei and Fan, Xunli and Song, Houbing and Wang, Huihui},
     title = {Video tamper detection based on multi-scale mutual information},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {19},
     pages = {27109}}
     
  86. H. Xiao, W. Lu, R. Li, N. Zhong, Y. Yeung, J. Chen, F. Xue & W. Sun
    Defocus blur detection based on multiscale SVD fusion in gradient domain
    Journal of Visual Communication and Image Representation, Elsevier BV, 2019, Vol. 59, pp. 52-61
    DOI: 10.1016/j.jvcir.2018.12.048
    BibTeX
    @article{Xiao2019,
     author = {Xiao, Huimei and Lu, Wei and Li, Ruipeng and Zhong, Nan and Yeung, Yuileong and Chen, Junjia and Xue, Fei and Sun, Wei},
     title = {Defocus blur detection based on multiscale SVD fusion in gradient domain},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2019},
     volume = {59},
     pages = {52--61}}
     
  87. H.-Y. Yang, S.-R. Qi, Y. Niu, P.-P. Niu & X.-Y. Wang
    Copy-move forgery detection based on adaptive keypoints extraction and matching
    Multimedia Tools and Applications, Springer, 2019, pp. 1
    DOI: 10.1007/s11042-019-08169-w
    BibTeX
    @article{Yang2019a,
     author = {Yang, Hong-Ying and Qi, Shu-Ren and Niu, Ying and Niu, Pan-Pan and Wang, Xiang-Yang},
     title = {Copy-move forgery detection based on adaptive keypoints extraction and matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     pages = {1}}
     
  88. X. Yang, Y. Li & S. Lyu
    Exposing Deep Fakes Using Inconsistent Head Poses
    Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
    2019, pp. 8261-8265
    DOI: 10.1109/ICASSP.2019.8683164
    BibTeX
    @inproceedings{Yang2019,
     author = {Yang, X. and Li, Y. and Lyu, S.},
     title = {Exposing Deep Fakes Using Inconsistent Head Poses},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics},
     year = {2019},
     pages = {8261--8265}}
     
  89. L. Yu, Y. Zhang, H. Han, L. Zhang & F. Wu
    Robust Median Filtering Forensics by CNN-Based Multiple Residuals Learning
    #IEEE_O_ACC#, 2019, Vol. 7, pp. 120594-120602
    DOI: 10.1109/ACCESS.2019.2932810
    BibTeX
    @article{Yu2019,
     author = {Yu, L. and Zhang, Y. and Han, H. and Zhang, L. and Wu, F.},
     title = {Robust Median Filtering Forensics by CNN-Based Multiple Residuals Learning},
     journal = {#IEEE_O_ACC#},
     year = {2019},
     volume = {7},
     pages = {120594--120602}}
     
  90. D. Zhang, X. Wang, M. Zhang & J. Hu
    Image splicing localization using noise distribution characteristic
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(16), pp. 22223
    DOI: 10.1007/s11042-019-7408-8
    BibTeX
    @article{Zhang2019,
     author = {Zhang, Depeng and Wang, Xiaofeng and Zhang, Meng and Hu, Jiaojiao},
     title = {Image splicing localization using noise distribution characteristic},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {16},
     pages = {22223}}
     
  91. W. Zhang, X. Tang, Z. Yang & S. Niu
    Multi-scale segmentation strategies in PRNU-based image tampering localization
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(14), pp. 20113
    DOI: 10.1007/s11042-019-7288-y
    BibTeX
    @article{Zhang2019a,
     author = {Zhang, Weiwei and Tang, Xinhua and Yang, Zhenghong and Niu, Shaozhang},
     title = {Multi-scale segmentation strategies in PRNU-based image tampering localization},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {14},
     pages = {20113}}
     
  92. J.-L. Zhong & C.-M. Pun
    Copy-move forgery detection using adaptive keypoint filtering and iterative region merging
    Multimedia Tools and Applications, Springer, 2019, Vol. 78(18), pp. 26313
    DOI: 10.1007/s11042-019-07817-5
    BibTeX
    @article{Zhong2019a,
     author = {Zhong, Jun-Liu and Pun, Chi-Man},
     title = {Copy-move forgery detection using adaptive keypoint filtering and iterative region merging},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2019},
     volume = {78},
     number = {18},
     pages = {26313}}
     
  93. Z. Zhong, L. Zheng, Z. Zheng, S. Li & Y. Yang
    CamStyle: A Novel Data Augmentation Method for Person Re-Identification
    IEEE Transactions on Image Processing, 2019, Vol. 28(3), pp. 1176-1190
    DOI: 10.1109/TIP.2018.2874313
    BibTeX
    @article{Zhong2019,
     author = {Zhong, Z. and Zheng, L. and Zheng, Z. and Li, S. and Yang, Y.},
     title = {CamStyle: A Novel Data Augmentation Method for Person Re-Identification},
     journal = {IEEE Transactions on Image Processing},
     year = {2019},
     volume = {28},
     number = {3},
     pages = {1176--1190}}
     
  94. Y. Zhuang & C. Hsu
    Detecting Generated Image Based on a Coupled Network with Two-Step Pairwise Learning
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2019, pp. 3212-3216
    DOI: 10.1109/ICIP.2019.8803464
    BibTeX
    @inproceedings{Zhuang2019,
     author = {Zhuang, Y. and Hsu, C.},
     title = {Detecting Generated Image Based on a Coupled Network with Two-Step Pairwise Learning},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2019},
     pages = {3212--3216}}
     


2018

  1. M. Abdel-Basset, G. Manogaran, A.E. Fakhry & I. El-Henawy
    2-Levels of clustering strategy to detect and locate copy-move forgery in digital images
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6266-0
    BibTeX
    @article{Abdel-Basset2018,
     author = {Abdel-Basset, Mohamed and Manogaran, Gunasekaran and Fakhry, Ahmed E. and El-Henawy, Ibrahim},
     title = {2-Levels of clustering strategy to detect and locate copy-move forgery in digital images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  2. A.Z. Abidin, Z.A. Shah, H. Hasan, A.A. Samah & H.A. Majid
    Histogram of Orientated Gradient (HOG) Approach in Image Forgery : Image Distorted by Brightness
    UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
    BibTeX
    @article{Abidin2018,
     author = {Abidin, Arfa Zainal and Shah, Zuraini Ali and Hasan, Haswadi and Samah, Azurah A. and Majid, Hairudin Abdul},
     title = {Histogram of Orientated Gradient (HOG) Approach in Image Forgery : Image Distorted by Brightness},
     journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications},
     year = {2018},
     volume = {3}}
     
  3. A.R. Abrahim, M.S.M. Rahim & G.B. Sulong
    Splicing image forgery identification based on artificial neural network approach and texture features
    Cluster Computing, Springer, 2018, pp. 1
    DOI: 10.1007/s10586-017-1668-8
    BibTeX
    @article{Abrahim2018,
     author = {Abrahim, Araz Rajab and Rahim, Mohd Shafry Mohd and Sulong, Ghazali Bin},
     title = {Splicing image forgery identification based on artificial neural network approach and texture features},
     journal = {Cluster Computing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  4. A. Agarwal, R. Keshari, M. Wadhwa, M. Vijh, C. Parmar, R. Singh & M. Vatsa
    Iris Sensor Identification in Multi-camera Environment
    Information Fusion, Elsevier BV, 2018
    DOI: 10.1016/j.inffus.2017.11.004
    BibTeX
    @article{Agarwal2018a,
     author = {Agarwal, Akshay and Keshari, Rohit and Wadhwa, Manya and Vijh, Mansi and Parmar, Chandani and Singh, Richa and Vatsa, Mayank},
     title = {Iris Sensor Identification in Multi-camera Environment},
     journal = {Information Fusion},
     publisher = {Elsevier BV},
     year = {2018}}
     
  5. S. Agarwal & S. Chand
    Image Forgery Detection Using Co-occurrence-Based Texture Operator in Frequency Domain
    Progress in Intelligent Computing Techniques: Theory, Practice, and Applications
    Springer, 2018
    DOI: 10.1007/978-981-10-3373-5_10
    BibTeX
    @incollection{Agarwal2018,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image Forgery Detection Using Co-occurrence-Based Texture Operator in Frequency Domain},
     booktitle = {Progress in Intelligent Computing Techniques: Theory, Practice, and Applications},
     publisher = {Springer},
     year = {2018}}
     
  6. H.A. Alberry, A. Hegazy & G. i Salama
    A Fast SIFT Based Method for Copy Move Forgery Detection
    Future Computing and Informatics Journal, Elsevier BV, 2018
    DOI: 10.1016/j.fcij.2018.03.001
    BibTeX
    @article{Alberry2018,
     author = {Alberry, Hesham Ahmed and Hegazy, Abdelfatah and i Salama, Gouda},
     title = {A Fast SIFT Based Method for Copy Move Forgery Detection},
     journal = {Future Computing and Informatics Journal},
     publisher = {Elsevier BV},
     year = {2018}}
     
  7. T. Allbeson & S. Allan
    The War of Images in the Age of Trump
    Trump's Media War
    Springer International Publishing, 2018, pp. 69-84
    DOI: 10.1007/978-3-319-94069-4_5
    BibTeX
    @incollection{Allbeson2018,
     author = {Allbeson, Tom and Allan, Stuart},
     title = {The War of Images in the Age of Trump},
     booktitle = {Trump's Media War},
     publisher = {Springer International Publishing},
     year = {2018},
     pages = {69--84}}
     
  8. M.S. Allili, N. Casemajor & A. Talbi
    Multiple image copy detection and evolution visualisation using tree graphs
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6350-5
    BibTeX
    @article{Allili2018,
     author = {Allili, Mohand Said and Casemajor, Nathalie and Talbi, Aymen},
     title = {Multiple image copy detection and evolution visualisation using tree graphs},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  9. O.M. Al-Qershi & B.E. Khoo
    Evaluation of copy-move forgery detection: datasets and evaluation metrics
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6201-4
    BibTeX
    @article{Al-Qershi2018,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Evaluation of copy-move forgery detection: datasets and evaluation metrics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  10. O.M. Al-Qershi & B.E. Khoo
    Enhanced block-based copy-move forgery detection using k-means clustering
    Multidimensional Systems and Signal Processing, Springer, 2018, pp. 1
    DOI: 10.1007/s11045-018-0624-y
    BibTeX
    @article{Al-Qershi2018a,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Enhanced block-based copy-move forgery detection using k-means clustering},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  11. O.I. Al-Sanjary, A.A. Ahmed, A.A.B. Jaharadak, M.A.M. Ali & H.M. Zangana
    Detection clone an object movement using an optical flow approach
    Proc. IEEE Symp. Computer Applications Industrial Electronics (ISCAIE)
    2018, pp. 388-394
    DOI: 10.1109/ISCAIE.2018.8405504
    BibTeX
    @inproceedings{Al-Sanjary2018a,
     author = {Al-Sanjary, O. I. and Ahmed, A. A. and Jaharadak, A. A. B. and Ali, M. A. M. and Zangana, H. M.},
     title = {Detection clone an object movement using an optical flow approach},
     booktitle = {Proc. IEEE Symp. Computer Applications Industrial Electronics (ISCAIE)},
     year = {2018},
     pages = {388--394}}
     
  12. O.I. Al-Sanjary, N. Ghazali, A.A. Ahmed & G. Sulong
    Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension
    Recent Trends in Information and Communication Technology
    Springer, 2018
    DOI: 10.1007/978-3-319-59427-9_41
    BibTeX
    @incollection{Al-Sanjary2018,
     author = {Al-Sanjary, Omar Ismael and Ghazali, Nurulhuda and Ahmed, Ahmed Abdullah and Sulong, Ghazali},
     title = {Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension},
     booktitle = {Recent Trends in Information and Communication Technology},
     publisher = {Springer},
     year = {2018}}
     
  13. E. Altinisik, K. Tasdemir & H.T. Sencar
    Extracting Prnu Noise from H.264 Coded Videos
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1367-1371
    DOI: 10.23919/EUSIPCO.2018.8553173
    BibTeX
    @inproceedings{Altinisik2018,
     author = {Altinisik, E. and Tasdemir, K. and Sencar, H. T.},
     title = {Extracting Prnu Noise from H.264 Coded Videos},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1367--1371}}
     
  14. Y. Annadani & C.V. Jawahar
    Augment and Adapt: A Simple Approach to Image Tampering Detection
    Proc. 24th Int. Conf. Pattern Recognition (ICPR)
    2018, pp. 2983-2988
    DOI: 10.1109/ICPR.2018.8545614
    BibTeX
    @inproceedings{Annadani2018,
     author = {Annadani, Y. and Jawahar, C. V.},
     title = {Augment and Adapt: A Simple Approach to Image Tampering Detection},
     booktitle = {Proc. 24th Int. Conf. Pattern Recognition (ICPR)},
     year = {2018},
     pages = {2983--2988}}
     
  15. M.S.S. Asiq & W.R.S. Emmanuel
    Polyscale gradients residual demosaicking
    Journal of King Saud University - Computer and Information Sciences, Elsevier BV, 2018
    DOI: 10.1016/j.jksuci.2018.02.014
    BibTeX
    @article{Asiq2018,
     author = {Asiq, M. S. Safna and Emmanuel, W. R. Sam},
     title = {Polyscale gradients residual demosaicking},
     journal = {Journal of King Saud University - Computer and Information Sciences},
     publisher = {Elsevier BV},
     year = {2018}}
     
  16. Y. Aydin, G. Muzaffer & G. Ulutaç
    Detection of copy move forgery technique based on SIFT and SURF
    Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
    2018, pp. 1-4
    DOI: 10.1109/SIU.2018.8404609
    BibTeX
    @inproceedings{Aydin2018,
     author = {Aydin, Y. and Muzaffer, G. and Ulutaç, G.},
     title = {Detection of copy move forgery technique based on SIFT and SURF},
     booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2018},
     pages = {1--4}}
     
  17. L. Azzari, L.R. Borges & A. Foi
    Modeling and Estimation of Signal-Dependent and Correlated Noise
    Denoising of Photographic Images and Video
    Springer, 2018
    DOI: 10.1007/978-3-319-96029-6_1
    BibTeX
    @incollection{Azzari2018,
     author = {Azzari, Lucio and Borges, Lucas Rodrigues and Foi, Alessandro},
     title = {Modeling and Estimation of Signal-Dependent and Correlated Noise},
     booktitle = {Denoising of Photographic Images and Video},
     publisher = {Springer},
     year = {2018}}
     
  18. H.H. Badi, B. Sabbri & F. Ajeel
    Rotation Invariant on Harris Interest Points for Exposing Image Region Duplication Forgery
    Evolving BCI Therapy - Engaging Brain State Dynamics
    InTech, 2018
    DOI: 10.5772/intechopen.76332
    BibTeX
    @incollection{Badi2018,
     author = {Badi, Haitham Hasan and Sabbri, Bassam and Ajeel, Fitian},
     title = {Rotation Invariant on Harris Interest Points for Exposing Image Region Duplication Forgery},
     booktitle = {Evolving BCI Therapy - Engaging Brain State Dynamics},
     publisher = {InTech},
     year = {2018}}
     
  19. S. Banerjee & A. Ross
    Impact of photometric transformations on PRNU estimation schemes: A case study using near infrared ocular images
    Proc. Int. Workshop Biometrics and Forensics (IWBF)
    2018, pp. 1-8
    DOI: 10.1109/IWBF.2018.8401560
    BibTeX
    @inproceedings{Banerjee2018,
     author = {Banerjee, S. and Ross, A.},
     title = {Impact of photometric transformations on PRNU estimation schemes: A case study using near infrared ocular images},
     booktitle = {Proc. Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2018},
     pages = {1--8}}
     
  20. M. Barni, H.S. Garcia & B. Tondi
    An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack
    ArXiv, 2018
    arXiv: 1805.02899v1
    BibTeX
    @article{Barni2018,
     author = {Barni, Mauro and Garcia, Hector Santoyo and Tondi, Benedetta},
     title = {An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack},
     journal = {ArXiv},
     year = {2018}}
     
  21. M. Barni, K. Kallas, E. Nowroozi & B. Tondi
    On the Transferability of Adversarial Examples Against CNN-Based Image Forensics
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.01629v1
    BibTeX
    @article{Barni2018b,
     author = {Barni, Mauro and Kallas, Kassem and Nowroozi, Ehsan and Tondi, Benedetta},
     title = {On the Transferability of Adversarial Examples Against CNN-Based Image Forensics},
     journal = {arXiv},
     year = {2018}}
     
  22. M. Barni, H. Santoyo-García & B. Tondi
    An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack
    #IEEE_J_SPL#, 2018, Vol. 25(10), pp. 1435-1439
    DOI: 10.1109/LSP.2018.2863045
    BibTeX
    @article{Barni2018a,
     author = {Barni, M. and Santoyo-García, H. and Tondi, B.},
     title = {An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack},
     journal = {#IEEE_J_SPL#},
     year = {2018},
     volume = {25},
     number = {10},
     pages = {1435--1439}}
     
  23. A.A. Basid, H.A. Majid & A.A. Samah
    Local Phase Quantization (LPQ) Descriptor Approach in Copy-Move Image Forgery: A Study Case of Blurring
    UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
    BibTeX
    @article{Basid2018,
     author = {Basid, Atikah Abd and Majid, Hairudin Abdul and Samah, Azurah A.},
     title = {Local Phase Quantization (LPQ) Descriptor Approach in Copy-Move Image Forgery: A Study Case of Blurring},
     journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications},
     year = {2018},
     volume = {3}}
     
  24. V.R. Basker & S. Chapaneri
    Chrominance based Splicing Image Forgery Localization with Relevance Vector Machine
    Proc. Electronics and Computer Science (SCEECS) 2018 IEEE Int. Students' Conf. Electrical
    2018, pp. 1-6
    DOI: 10.1109/SCEECS.2018.8546959
    BibTeX
    @inproceedings{Basker2018,
     author = {Basker, V. R. and Chapaneri, S.},
     title = {Chrominance based Splicing Image Forgery Localization with Relevance Vector Machine},
     booktitle = {Proc. Electronics and Computer Science (SCEECS) 2018 IEEE Int. Students' Conf. Electrical},
     year = {2018},
     pages = {1--6}}
     
  25. B. Bayar & M.C. Stamm
    Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
    IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(11), pp. 2691-2706
    DOI: 10.1109/TIFS.2018.2825953
    BibTeX
    @article{Bayar2018,
     author = {Bayar, B. and Stamm, M. C.},
     title = {Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {13},
     number = {11},
     pages = {2691--2706}}
     
  26. B. Bayar & M.C. Stamm
    Towards Open Set Camera Model Identification Using a Deep Learning Framework
    Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
    2018, pp. 2007-2011
    DOI: 10.1109/ICASSP.2018.8462383
    BibTeX
    @inproceedings{Bayar2018a,
     author = {Bayar, B. and Stamm, M. C.},
     title = {Towards Open Set Camera Model Identification Using a Deep Learning Framework},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics},
     year = {2018},
     pages = {2007--2011}}
     
  27. C. Ben Rabah, G. Coatrieux & R. Abdelfattah
    Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain
    Advanced Concepts for Intelligent Vision Systems, Springer, 2018
    DOI: 10.1007/978-3-030-01449-0_50
    BibTeX
    @article{BenRabah2018,
     author = {Ben Rabah, Chaima and Coatrieux, Gouenou and Abdelfattah, Riadh},
     title = {Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2018}}
     
  28. D. Bhardwaj, C. Kumawat & V. Pankajakshan
    A Method for Detecting JPEG Anti-forensics
    Computer Vision, Pattern Recognition, Image Processing, and Graphics
    Springer, 2018
    DOI: 10.1007/978-981-13-0020-2_17
    BibTeX
    @incollection{Bhardwaj2018,
     author = {Bhardwaj, Dinesh and Kumawat, Chothmal and Pankajakshan, Vinod},
     title = {A Method for Detecting JPEG Anti-forensics},
     booktitle = {Computer Vision, Pattern Recognition, Image Processing, and Graphics},
     publisher = {Springer},
     year = {2018}}
     
  29. K. Bhogale, N. Shankar, A. Juvekar & A. Padhi
    Face Verification and Forgery Detection for Ophthalmic Surgery Images
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.06194v1
    BibTeX
    @article{Bhogale2018,
     author = {Bhogale, Kaushal and Shankar, Nishant and Juvekar, Adheesh and Padhi, Asutosh},
     title = {Face Verification and Forgery Detection for Ophthalmic Surgery Images},
     journal = {arXiv},
     year = {2018}}
     
  30. X. Bi & C.-M. Pun
    Fast copy-move forgery detection using local bidirectional coherency error refinement
    Pattern Recognition, Elsevier BV, 2018, Vol. 81, pp. 161-175
    DOI: 10.1016/j.patcog.2018.03.028
    BibTeX
    @article{Bi2018,
     author = {Bi, Xiuli and Pun, Chi-Man},
     title = {Fast copy-move forgery detection using local bidirectional coherency error refinement},
     journal = {Pattern Recognition},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {81},
     pages = {161--175}}
     
  31. N. Bonettini, L. Bondi, `.S. Mandelli, P. Bestagini, S. Tubaro, D. Guera & E.J. Delp
    Fooling PRNU-based detectors through convolutional neural networks
    2018
    BibTeX
    @article{Bonettini2018,
     author = {Bonettini, Nicolo and Bondi, Luca and Mandelli, ` Sara and Bestagini, Paolo and Tubaro, Stefano and Guera, David and Delp, Edward J.},
     title = {Fooling PRNU-based detectors through convolutional neural networks},
     year = {2018}}
     
  32. N. Bonettini, L. Bondi, S. Mandelli, P. Bestagini, S. Tubaro & D. Güera
    Fooling PRNU-Based Detectors Through Convolutional Neural Networks
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 957-961
    DOI: 10.23919/EUSIPCO.2018.8553596
    BibTeX
    @inproceedings{Bonettini2018a,
     author = {Bonettini, N. and Bondi, L. and Mandelli, S. and Bestagini, P. and Tubaro, S. and Güera, D.},
     title = {Fooling PRNU-Based Detectors Through Convolutional Neural Networks},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {957--961}}
     
  33. A. Bruno & G. Cattaneo
    Effects of H.265 encoding on PNU and source camera identification
    Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems - RACS '18
    ACM Press, 2018
    DOI: 10.1145/3264746.3264770
    BibTeX
    @inproceedings{Bruno2018,
     author = {Bruno, Andrea and Cattaneo, Giuseppe},
     title = {Effects of H.265 encoding on PNU and source camera identification},
     booktitle = {Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems - RACS '18},
     publisher = {ACM Press},
     year = {2018}}
     
  34. X. Cai & B. Song
    Semantic object removal with convolutional neural network feature-based inpainting approach
    Multimedia Systems, Springer, 2018, pp. 1
    DOI: 10.1007/s00530-018-0585-x
    BibTeX
    @article{Cai2018,
     author = {Cai, Xiuxia and Song, Bin},
     title = {Semantic object removal with convolutional neural network feature-based inpainting approach},
     journal = {Multimedia Systems},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  35. R. Caldelli, I. Amerini & C.T. Li
    PRNU-based Image Classification of Origin Social Network with CNN
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1357-1361
    DOI: 10.23919/EUSIPCO.2018.8553160
    BibTeX
    @inproceedings{Caldelli2018,
     author = {Caldelli, R. and Amerini, I. and Li, C. T.},
     title = {PRNU-based Image Classification of Origin Social Network with CNN},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1357--1361}}
     
  36. F. Carrara, F. Falchi, R. Caldelli, G. Amato & R. Becarelli
    Adversarial image detection in deep neural networks
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5853-4
    BibTeX
    @article{Carrara2018,
     author = {Carrara, Fabio and Falchi, Fabrizio and Caldelli, Roberto and Amato, Giuseppe and Becarelli, Rudy},
     title = {Adversarial image detection in deep neural networks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  37. K.K. Çevik, F.S. Berber & E.U. Kucuksille
    Mapping location of a suspect by using forensic images taken with their own mobile phone
    Proc of the International Conference on Engineering Technologies (ICENTE'18)
    2018
    BibTeX
    @conference{Cevik2018,
     author = {Çevik, Kerim Kürşat and Berber, Faruk Süleyman and Kucuksille, Ecir Ugur},
     title = {Mapping location of a suspect by using forensic images taken with their own mobile phone},
     booktitle = {Proc of the International Conference on Engineering Technologies (ICENTE'18)},
     year = {2018}}
     
  38. B. Chen, X. Qi, Y. Wang & H. Shim
    An Improved Splicing Localization Method by Fully Convolutional Networks
    2018
    BibTeX
    @misc{Chen2018d,
     author = {Chen, B. and Qi, X. and Wang, Y. and Shim, Hjae},
     title = {An Improved Splicing Localization Method by Fully Convolutional Networks},
     year = {2018}}
     
  39. B. Chen, X. Qi, Y. Wang, Y. Zheng, H.J. Shim & Y. Shi
    An Improved Splicing Localization Method by Fully Convolutional Networks
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 69472-69480
    DOI: 10.1109/ACCESS.2018.2880433
    BibTeX
    @article{Chen2018g,
     author = {Chen, B. and Qi, X. and Wang, Y. and Zheng, Y. and Shim, H. J. and Shi, Y.},
     title = {An Improved Splicing Localization Method by Fully Convolutional Networks},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {69472--69480}}
     
  40. B. Chen, M. Yu, Q. Su, H.J. Shim & Y. Shi
    Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 56637-56646
    DOI: 10.1109/ACCESS.2018.2871952
    BibTeX
    @article{Chen2018c,
     author = {Chen, B. and Yu, M. and Su, Q. and Shim, H. J. and Shi, Y.},
     title = {Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {56637--56646}}
     
  41. C. Chen, S. McCloskey & J. Yu
    Focus manipulation detection via photometric histogram analysis
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
    2018
    BibTeX
    @inproceedings{Chen2018a,
     author = {Chen, Can and McCloskey, Scott and Yu, Jingyi},
     title = {Focus manipulation detection via photometric histogram analysis},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018},
     year = {2018}}
     
  42. C. Chen, X. Zhao & M.C. Stamm
    Mislgan: An Anti-Forensic Camera Model Falsification Framework Using A Generative Adversarial Network
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 535-539
    DOI: 10.1109/ICIP.2018.8451503
    BibTeX
    @inproceedings{Chen2018b,
     author = {Chen, C. and Zhao, X. and Stamm, M. C.},
     title = {Mislgan: An Anti-Forensic Camera Model Falsification Framework Using A Generative Adversarial Network},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {535--539}}
     
  43. H. Chen, C. Zhao, Z. Shi & F. Zhu
    An Image Splicing Localization Algorithm Based on SLIC and Image Features
    Advances in Multimedia Information Processing – PCM 2018, Springer, 2018
    DOI: 10.1007/978-3-030-00764-5_56
    BibTeX
    @article{Chen2018f,
     author = {Chen, Haipeng and Zhao, Chaoran and Shi, Zenan and Zhu, Fuxiang},
     title = {An Image Splicing Localization Algorithm Based on SLIC and Image Features},
     journal = {Advances in Multimedia Information Processing – PCM 2018},
     publisher = {Springer},
     year = {2018}}
     
  44. Y. Chen, X. Zhu, W. Zheng & J. Lai
    Person Re-Identification by Camera Correlation Aware Feature Augmentation
    #IEEE_J_PAMI#, 2018, Vol. 40(2), pp. 392-408
    DOI: 10.1109/TPAMI.2017.2666805
    BibTeX
    @article{Chen2018e,
     author = {Chen, Y. and Zhu, X. and Zheng, W. and Lai, J.},
     title = {Person Re-Identification by Camera Correlation Aware Feature Augmentation},
     journal = {#IEEE_J_PAMI#},
     year = {2018},
     volume = {40},
     number = {2},
     pages = {392--408}}
     
  45. Z. Chen, B. Tondi, X. Li, R. Ni, Y. Zhao & M. Barni
    Secure Detection of Image Manipulation by means of Random Feature Selection
    ArXiv, 2018
    arXiv: 1802.00573v1
    BibTeX
    @article{Chen2018,
     author = {Chen, Zhipeng and Tondi, Benedetta and Li, Xiaolong and Ni, Rongrong and Zhao, Yao and Barni, Mauro},
     title = {Secure Detection of Image Manipulation by means of Random Feature Selection},
     journal = {ArXiv},
     year = {2018}}
     
  46. H. Cheng, J. Wei, C. Lin & J. Ye
    Detecting Seam-Carved Image by Extreme Learning Machines Using Patch Analysis Method, Jury Voting, and Combinatorial Fusion
    and Cybernetics: Systems IEEE Transactions on Systems, Man, 2018, pp. 1-15
    DOI: 10.1109/TSMC.2018.2789460
    BibTeX
    @article{Cheng2018a,
     author = {Cheng, H. and Wei, J. and Lin, C. and Ye, J.},
     title = {Detecting Seam-Carved Image by Extreme Learning Machines Using Patch Analysis Method, Jury Voting, and Combinatorial Fusion},
     journal = {and Cybernetics: Systems IEEE Transactions on Systems, Man},
     year = {2018},
     pages = {1--15}}
     
  47. J. Cheng, Y. Wu, W. Abd-Almageed & P. Natarajan
    Image-to-GPS Verification Through A Bottom-Up Pattern Matching Network
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.07288v1
    BibTeX
    @article{Cheng2018,
     author = {Cheng, Jiaxin and Wu, Yue and Abd-Almageed, Wael and Natarajan, Prem},
     title = {Image-to-GPS Verification Through A Bottom-Up Pattern Matching Network},
     journal = {arXiv},
     year = {2018}}
     
  48. C.-L. Chou & J.-C. Lee
    Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns
    Security with Intelligent Computing and Big-data Services
    Springer, 2018
    DOI: 10.1007/978-3-319-76451-1_5
    BibTeX
    @incollection{Chou2018,
     author = {Chou, Chao-Lung and Lee, Jen-Chun},
     title = {Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns},
     booktitle = {Security with Intelligent Computing and Big-data Services},
     publisher = {Springer},
     year = {2018}}
     
  49. M. Cicconet, H. Elliott, D.L. Richmond, D. Wainstock & M. Walsh
    Image Forensics: Detecting duplication of scientific images with manipulation-invariant image similarity
    ArXiv, 2018
    arXiv: 1802.06515v1
    BibTeX
    @article{Cicconet2018,
     author = {Cicconet, M. and Elliott, H. and Richmond, D. L. and Wainstock, D. and Walsh, M.},
     title = {Image Forensics: Detecting duplication of scientific images with manipulation-invariant image similarity},
     journal = {ArXiv},
     year = {2018}}
     
  50. L.F.S. Cieslak, K.A. da Costa & J. PauloPapa
    Seam Carving Detection Using Convolutional Neural Networks
    Proc. IEEE 12th Int. Symp. Applied Computational Intelligence and Informatics (SACI)
    2018, pp. 000195-000200
    DOI: 10.1109/SACI.2018.8441016
    BibTeX
    @inproceedings{Cieslak2018,
     author = {Cieslak, L. Fernandoda Silva and da Costa, K. AugustoPontara and PauloPapa, J.},
     title = {Seam Carving Detection Using Convolutional Neural Networks},
     booktitle = {Proc. IEEE 12th Int. Symp. Applied Computational Intelligence and Informatics (SACI)},
     year = {2018},
     pages = {000195--000200}}
     
  51. R. Cogranne
    Determining JPEG Image Standard Quality Factor from the Quantization Tables
    ArXiv, 2018
    arXiv: 1802.00992v1
    BibTeX
    @article{Cogranne2018,
     author = {Cogranne, Rémi},
     title = {Determining JPEG Image Standard Quality Factor from the Quantization Tables},
     journal = {ArXiv},
     year = {2018}}
     
  52. D. Cozzolino, J. Thies, A. Rössler, C. Riess, M. Nießner & L. Verdoliva
    ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1812.02510v1
    BibTeX
    @article{Cozzolino2018b,
     author = {Cozzolino, Davide and Thies, Justus and Rössler, Andreas and Riess, Christian and Nießner, Matthias and Verdoliva, Luisa},
     title = {ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection},
     journal = {arXiv},
     year = {2018}}
     
  53. D. Cozzolino & L. Verdoliva
    Noiseprint: A CNN-based camera model fingerprint
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1808.08396v1
    BibTeX
    @article{Cozzolino2018,
     author = {Cozzolino, Davide and Verdoliva, Luisa},
     title = {Noiseprint: A CNN-based camera model fingerprint},
     journal = {arXiv},
     year = {2018}}
     
  54. D. Cozzolino & L. Verdoliva
    Camera-based Image Forgery Localization using Convolutional Neural Networks
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1372-1376
    DOI: 10.23919/EUSIPCO.2018.8553581
    BibTeX
    @inproceedings{Cozzolino2018a,
     author = {Cozzolino, D. and Verdoliva, L.},
     title = {Camera-based Image Forgery Localization using Convolutional Neural Networks},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1372--1376}}
     
  55. N. Dalmia & M. Okade
    Robust first quantization matrix estimation based on filtering of recompression artifacts for non-aligned double compressed JPEG images
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 61, pp. 9-20
    DOI: 10.1016/j.image.2017.10.011
    BibTeX
    @article{Dalmia2018,
     author = {Dalmia, Nandita and Okade, Manish},
     title = {Robust first quantization matrix estimation based on filtering of recompression artifacts for non-aligned double compressed JPEG images},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {61},
     pages = {9--20}}
     
  56. L. D’Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection and Localization
    #IEEE_J_CASVT#, 2018, pp. 1
    DOI: 10.1109/TCSVT.2018.2804768
    BibTeX
    @article{DextquoterightAmiano2018,
     author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection and Localization},
     journal = {#IEEE_J_CASVT#},
     year = {2018},
     pages = {1}}
     
  57. T. Das, R. Hasan, M.R. Azam & J. Uddin
    A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform
    Proc. Material and Electronic Engineering (IC4ME2) 2018 Int. Conf. Computer, Communication, Chemical
    2018, pp. 1-4
    DOI: 10.1109/IC4ME2.2018.8465668
    BibTeX
    @inproceedings{Das2018c,
     author = {Das, T. and Hasan, R. and Azam, M. R. and Uddin, J.},
     title = {A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform},
     booktitle = {Proc. Material and Electronic Engineering (IC4ME2) 2018 Int. Conf. Computer, Communication, Chemical},
     year = {2018},
     pages = {1--4}}
     
  58. T.K. Das
    Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6170-7
    BibTeX
    @article{Das2018a,
     author = {Das, Tanmoy Kanti},
     title = {Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  59. T.K. Das
    Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6170-7
    BibTeX
    @article{Das2018b,
     author = {Das, Tanmoy Kanti},
     title = {Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  60. U.K. Das, S.G. Samaddar & P.K. Keserwani
    Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localization Based Hash Function
    Intelligent Communication and Computational Technologies
    Springer, 2018
    DOI: 10.1007/978-981-10-5523-2_14
    BibTeX
    @incollection{Das2018,
     author = {Das, Ujjal Kumar and Samaddar, Shefalika Ghosh and Keserwani, Pankaj Kumar},
     title = {Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localization Based Hash Function},
     booktitle = {Intelligent Communication and Computational Technologies},
     publisher = {Springer},
     year = {2018}}
     
  61. L. Debiasi, C. Rathgeb, U. Scherhag, A. Uhl & C. Busch
    PRNU Variance Analysis for Morphed Face Image Detection
    2018
    BibTeX
    @misc{Debiasi2018a,
     author = {Debiasi, Luca and Rathgeb, Christian and Scherhag, Ulrich and Uhl, Andreas and Busch, Christoph},
     title = {PRNU Variance Analysis for Morphed Face Image Detection},
     year = {2018}}
     
  62. L. Debiasi, U. Scherhag, C. Rathgeb, A. Uhl & C. Busch
    PRNU-based detection of morphed face images
    Proc. Int. Workshop Biometrics and Forensics (IWBF)
    2018, pp. 1-7
    DOI: 10.1109/IWBF.2018.8401555
    BibTeX
    @inproceedings{Debiasi2018,
     author = {Debiasi, L. and Scherhag, U. and Rathgeb, C. and Uhl, A. and Busch, C.},
     title = {PRNU-based detection of morphed face images},
     booktitle = {Proc. Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2018},
     pages = {1--7}}
     
  63. C. Destruel, V. Itier, O. Strauss & W. Puech
    Color Noise-Based Feature for Splicing Detection and Localization
    Proc. IEEE 20th Int. Workshop Multimedia Signal Processing (MMSP)
    2018, pp. 1-6
    DOI: 10.1109/MMSP.2018.8547093
    BibTeX
    @inproceedings{Destruel2018,
     author = {Destruel, C. and Itier, V. and Strauss, O. and Puech, W.},
     title = {Color Noise-Based Feature for Splicing Detection and Localization},
     booktitle = {Proc. IEEE 20th Int. Workshop Multimedia Signal Processing (MMSP)},
     year = {2018},
     pages = {1--6}}
     
  64. F. Ding, Y. Shi, G. Zhu & Y.-Q. Shi
    Smoothing identification for digital image forensics
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6807-6
    BibTeX
    @article{Ding2018b,
     author = {Ding, Feng and Shi, Yuxi and Zhu, Guopu and Shi, Yun-Qing},
     title = {Smoothing identification for digital image forensics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  65. F. Ding, G. Zhu, W. Dong & Y.-Q. Shi
    An efficient weak sharpening detection method for image forensics
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 50, pp. 93-99
    DOI: 10.1016/j.jvcir.2017.11.009
    BibTeX
    @article{Ding2018,
     author = {Ding, Feng and Zhu, Guopu and Dong, Weiqiang and Shi, Yun-Qing},
     title = {An efficient weak sharpening detection method for image forensics},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {50},
     pages = {93--99}}
     
  66. W. Ding, Y. Xie & Y. Wang
    Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value
    Multimedia Tools and Applications, Springer Nature, 2018
    DOI: 10.1007/s11042-018-5732-z
    BibTeX
    @article{Ding2018a,
     author = {Ding, Wenjia and Xie, Yi and Wang, Yulin},
     title = {Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2018}}
     
  67. R. Dixit & R. Naskar
    Region duplication detection in digital images based on Centroid Linkage Clustering of key–points and graph similarity matching
    Multimedia Tools and Applications, Springer Nature America, Inc, 2018
    DOI: 10.1007/s11042-018-6666-1
    BibTeX
    @article{Dixit2018,
     author = {Dixit, Rahul and Naskar, Ruchira},
     title = {Region duplication detection in digital images based on Centroid Linkage Clustering of key–points and graph similarity matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature America, Inc},
     year = {2018}}
     
  68. M.A. Elaskily, H.A. Elnemr, M.M. Dessouky & O.S. Faragallah
    Two stages object recognition based copy-move forgery detection algorithm
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6891-7
    BibTeX
    @article{Elaskily2018,
     author = {Elaskily, Mohamed A. and Elnemr, Heba A. and Dessouky, Mohamed M. and Faragallah, Osama S.},
     title = {Two stages object recognition based copy-move forgery detection algorithm},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  69. A. El-Yamany, H. Fouad & Y. Raffat
    A Generic Approach CNN-Based Camera Identification for Manipulated Images
    Proc. IEEE Int. Conf. Electro/Information Technology (EIT)
    2018, pp. 0165-0169
    DOI: 10.1109/EIT.2018.8500312
    BibTeX
    @inproceedings{El-Yamany2018,
     author = {El-Yamany, A. and Fouad, H. and Raffat, Y.},
     title = {A Generic Approach CNN-Based Camera Identification for Manipulated Images},
     booktitle = {Proc. IEEE Int. Conf. Electro/Information Technology (EIT)},
     year = {2018},
     pages = {0165--0169}}
     
  70. N.I. Evdokimova & V.V. Myasnikov
    Detecting forgery in image time series based on anomaly detection
    Proc. of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)
    2018
    BibTeX
    @inproceedings{Evdokimova2018,
     author = {Evdokimova, N. I. and Myasnikov, V. V.},
     title = {Detecting forgery in image time series based on anomaly detection},
     booktitle = {Proc. of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)},
     year = {2018}}
     
  71. A. Fadlil, I. Riadi & T. Sari
    Measurement of Copy-Move Forensic Image Similarity Using Distance Function
    Advanced Science Letters, American Scientific Publishers, 2018, Vol. 24(12), pp. 9157-9162
    DOI: 10.1166/asl.2018.12116
    BibTeX
    @article{Fadlil2018,
     author = {Fadlil, Abdul and Riadi, Imam and Sari, Titi},
     title = {Measurement of Copy-Move Forensic Image Similarity Using Distance Function},
     journal = {Advanced Science Letters},
     publisher = {American Scientific Publishers},
     year = {2018},
     volume = {24},
     number = {12},
     pages = {9157--9162}}
     
  72. L. Fan, H. Li, M. Li, Y. Zhang, J. Li & C. Zhang
    Photographer trajectory detection from images
    Personal and Ubiquitous Computing, Springer, 2018, pp. 1
    DOI: 10.1007/s00779-018-1150-5
    BibTeX
    @article{Fan2018,
     author = {Fan, Linwei and Li, Huiyu and Li, Mengjun and Zhang, Yan and Li, Jinjiang and Zhang, Caiming},
     title = {Photographer trajectory detection from images},
     journal = {Personal and Ubiquitous Computing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  73. W. Fan, G. Valenzise, F. Banterle & F. Dufaux
    Fine-grained detection of inverse tone mapping in HDR images
    Signal Processing, Elsevier BV, 2018, Vol. 152, pp. 178-188
    DOI: 10.1016/j.sigpro.2018.05.028
    BibTeX
    @article{Fan2018a,
     author = {Fan, Wei and Valenzise, Giuseppe and Banterle, Francesco and Dufaux, Frédéric},
     title = {Fine-grained detection of inverse tone mapping in HDR images},
     journal = {Signal Processing},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {152},
     pages = {178--188}}
     
  74. E.G. Fernández, A.S. Orozco, L.G. Villalba & J. Hernandez-Castro
    Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts
    Sensors, MDPI AG, 2018, Vol. 18(9), pp. 2804
    DOI: 10.3390/s18092804
    BibTeX
    @article{Fernandez2018,
     author = {Fernández, Edgar González and Orozco, Ana Sandoval and Villalba, Luis Garc\ia and Hernandez-Castro, Julio},
     title = {Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2018},
     volume = {18},
     number = {9},
     pages = {2804}}
     
  75. M. Ferrara, A. Franco & D. Maltoni
    Face Demorphing
    IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(4), pp. 1008-1017
    DOI: 10.1109/TIFS.2017.2777340
    BibTeX
    @article{Ferrara2018,
     author = {Ferrara, M. and Franco, A. and Maltoni, D.},
     title = {Face Demorphing},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {13},
     number = {4},
     pages = {1008--1017}}
     
  76. M. Ferrara, A. Franco & D. Maltoni
    Face demorphing in the presence of facial appearance variations
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 2365-2369
    DOI: 10.23919/EUSIPCO.2018.8553430
    BibTeX
    @inproceedings{Ferrara2018b,
     author = {Ferrara, M. and Franco, A. and Maltoni, D.},
     title = {Face demorphing in the presence of facial appearance variations},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {2365--2369}}
     
  77. A. Ferreira
    Counteracting the contemporaneous proliferation of digital forgeries and fake news
    2018
    BibTeX
    @misc{Ferreira2018,
     author = {Ferreira, Alexandre},
     title = {Counteracting the contemporaneous proliferation of digital forgeries and fake news},
     year = {2018}}
     
  78. N. Fule & V. Mane
    Improved Matching Technique in Digital Image Region Duplication
    Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics
    2018, pp. 427-430
    DOI: 10.1109/ICECA.2018.8474683
    BibTeX
    @inproceedings{Fule2018,
     author = {Fule, N. and Mane, V.},
     title = {Improved Matching Technique in Digital Image Region Duplication},
     booktitle = {Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics},
     year = {2018},
     pages = {427--430}}
     
  79. H. Gao, M. Hu, T. Gao & R. Cheng
    An Effective Image Detection Algorithm for USM Sharpening Based on Pixel-Pair Histogram
    Advances in Multimedia Information Processing – PCM 2018, Springer, 2018
    DOI: 10.1007/978-3-030-00767-6_37
    BibTeX
    @article{Gao2018,
     author = {Gao, Hang and Hu, Mengting and Gao, Tiegang and Cheng, Renhong},
     title = {An Effective Image Detection Algorithm for USM Sharpening Based on Pixel-Pair Histogram},
     journal = {Advances in Multimedia Information Processing – PCM 2018},
     publisher = {Springer},
     year = {2018}}
     
  80. J.D. Gavade & S.R. Chougule
    Passive Blind Forensic Scheme for Copy-Move Temporal Tampering Detection
    Proc. Int. Conf. On Advances in Communication and Computing Technology (ICACCT)
    2018, pp. 155-160
    DOI: 10.1109/ICACCT.2018.8529536
    BibTeX
    @inproceedings{Gavade2018,
     author = {Gavade, J. D. and Chougule, S. R.},
     title = {Passive Blind Forensic Scheme for Copy-Move Temporal Tampering Detection},
     booktitle = {Proc. Int. Conf. On Advances in Communication and Computing Technology (ICACCT)},
     year = {2018},
     pages = {155--160}}
     
  81. M. Geiger
    2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge Honors Theses
    Union College, Union College, 2018
    BibTeX
    @mastersthesis{Geiger2018,
     author = {Geiger, Michael},
     title = {2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge Honors Theses},
     school = {Union College},
     year = {2018}}
     
  82. A. Ghoneim, G. Muhammad, S.U. Amin & B. Gupta
    Medical Image Forgery Detection for Smart Healthcare
    IEEE Communications Magazine, Institute of Electrical and Electronics Engineers (IEEE), 2018, Vol. 56(4), pp. 33-37
    DOI: 10.1109/mcom.2018.1700817
    BibTeX
    @article{Ghoneim2018,
     author = {Ghoneim, Ahmed and Muhammad, Ghulam and Amin, Syed Umar and Gupta, Brij},
     title = {Medical Image Forgery Detection for Smart Healthcare},
     journal = {IEEE Communications Magazine},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2018},
     volume = {56},
     number = {4},
     pages = {33--37}}
     
  83. D. Güera, Y. Wang, L. Bondi, P. Bestagini, S. Tubaro & E.J. Delp
    Reliability Map Estimation For CNN-Based Camera Model Attribution
    Purdue University West Lafayette, Indiana, Purdue University West Lafayette, Indiana, 2018
    BibTeX
    @techreport{Gueera2018,
     author = {Güera, David and Wang, Yu and Bondi, Luca and Bestagini, Paolo and Tubaro, Stefano and Delp, Edward. J.},
     title = {Reliability Map Estimation For CNN-Based Camera Model Attribution},
     school = {Purdue University West Lafayette, Indiana},
     year = {2018}}
     
  84. D. Guera, F. Zhu, S.K. Yarlagadda, S. Tubaro, P. Bestagini & E.J. Delp
    Reliability Map Estimation for CNN-Based Camera Model Attribution
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2018, pp. 964-973
    DOI: 10.1109/WACV.2018.00111
    BibTeX
    @inproceedings{Guera2018,
     author = {Guera, D. and Zhu, F. and Yarlagadda, S. K. and Tubaro, S. and Bestagini, P. and Delp, E. J.},
     title = {Reliability Map Estimation for CNN-Based Camera Model Attribution},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2018},
     pages = {964--973}}
     
  85. D. Güera, F. Zhu, S.K. Yarlagadda, S. Tubaro, P. Bestagini & E.J. Delp
    Reliability Map Estimation for CNN-Based Camera Model Attribution
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2018, pp. 964-973
    DOI: 10.1109/WACV.2018.00111
    BibTeX
    @inproceedings{Gueera2018a,
     author = {Güera, D. and Zhu, F. and Yarlagadda, S. K. and Tubaro, S. and Bestagini, P. and Delp, E. J.},
     title = {Reliability Map Estimation for CNN-Based Camera Model Attribution},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2018},
     pages = {964--973}}
     
  86. Y. Guo, X. Cao, W. Zhang & R. Wang
    Fake Colorized Image Detection
    ArXiv, 2018
    arXiv: 1801.02768v2
    BibTeX
    @article{Guo2018,
     author = {Guo, Yuanfang and Cao, Xiaochun and Zhang, Wei and Wang, Rui},
     title = {Fake Colorized Image Detection},
     journal = {ArXiv},
     year = {2018}}
     
  87. Y. Guo, X. Cao, W. Zhang & R. Wang
    Fake Colorized Image Detection
    #IEEE_J_IFS#, 2018, Vol. 13(8), pp. 1932-1944
    DOI: 10.1109/TIFS.2018.2806926
    BibTeX
    @article{Guo2018a,
     author = {Guo, Y. and Cao, X. and Zhang, W. and Wang, R.},
     title = {Fake Colorized Image Detection},
     journal = {#IEEE_J_IFS#},
     year = {2018},
     volume = {13},
     number = {8},
     pages = {1932--1944}}
     
  88. A. Gupta
    A New Copy Move Forgery Detection Technique using Adaptive over-Segementation and Feature Point Matching
    Bulletin of Eletrical Engineering and Informatics, 2018
    BibTeX
    @article{Gupta2018,
     author = {Gupta, Anil},
     title = {A New Copy Move Forgery Detection Technique using Adaptive over-Segementation and Feature Point Matching},
     journal = {Bulletin of Eletrical Engineering and Informatics},
     year = {2018}}
     
  89. B. Gupta & M. Tiwari
    Improving Performance of Source-Camera Identification By Suppressing Peaks and Eliminating Low-Frequency Defects of Reference SPN
    IEEE Signal Processing Letters, 2018, Vol. 25(9), pp. 1340-1343
    DOI: 10.1109/LSP.2018.2857223
    BibTeX
    @article{Gupta2018b,
     author = {Gupta, B. and Tiwari, M.},
     title = {Improving Performance of Source-Camera Identification By Suppressing Peaks and Eliminating Low-Frequency Defects of Reference SPN},
     journal = {IEEE Signal Processing Letters},
     year = {2018},
     volume = {25},
     number = {9},
     pages = {1340--1343}}
     
  90. B. Gupta & M. Tiwari
    An empirical cross-validation of denoising filters for PRNU extraction
    Forensic Science International, Elsevier BV, 2018, Vol. 292, pp. 110-114
    DOI: 10.1016/j.forsciint.2018.09.017
    BibTeX
    @article{Gupta2018c,
     author = {Gupta, Bhupendra and Tiwari, Mayank},
     title = {An empirical cross-validation of denoising filters for PRNU extraction},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {292},
     pages = {110--114}}
     
  91. B. Gupta & M. Tiwari
    Improving source camera identification performance using DCT based image frequency components dependent sensor pattern noise extraction method
    Digital Investigation, Elsevier BV, 2018, Vol. 24, pp. 121-127
    DOI: 10.1016/j.diin.2018.02.003
    BibTeX
    @article{Gupta2018d,
     author = {Gupta, Bhupendra and Tiwari, Mayank},
     title = {Improving source camera identification performance using DCT based image frequency components dependent sensor pattern noise extraction method},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {24},
     pages = {121--127}}
     
  92. S. Gupta & N. Mohan
    Color Channel Characteristics (CCC) for Efficient Digital Image Forensics
    Engineering, Technology & Applied Science Research, 2018, Vol. 8(1)
    BibTeX
    @article{Gupta2018a,
     author = {Gupta, S. and Mohan, N.},
     title = {Color Channel Characteristics (CCC) for Efficient Digital Image Forensics},
     journal = {Engineering, Technology & Applied Science Research},
     year = {2018},
     volume = {8},
     number = {1}}
     
  93. S. Gupta, N. Mohan & P.S. Sandhu
    Energy deviation measure: a technique for digital image forensics
    International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, 2018, Vol. 10(4), pp. 401
    DOI: 10.1504/ijesdf.2018.10015333
    BibTeX
    @article{Gupta2018e,
     author = {Gupta, Surbhi and Mohan, Neeraj and Sandhu, Parvinder Singh},
     title = {Energy deviation measure: a technique for digital image forensics},
     journal = {International Journal of Electronic Security and Digital Forensics},
     publisher = {Inderscience Publishers},
     year = {2018},
     volume = {10},
     number = {4},
     pages = {401}}
     
  94. B. Gurunlu & S. Ozturk
    A Survey on Photo Forgery Detection Methods
    Cattani, C., Atangana, A., Bulut, H., Hammouch, Z., Baskonus, H. M., Mekkaoui, T. & Agoujil, S. (ed.)
    ITM Web of Conferences, EDP Sciences, 2018, Vol. 22, pp. 01055
    DOI: 10.1051/itmconf/20182201055
    BibTeX
    @article{Gurunlu2018,
     author = {Gurunlu, Bilgehan and Ozturk, Serkan},
     title = {A Survey on Photo Forgery Detection Methods},
     journal = {ITM Web of Conferences},
     publisher = {EDP Sciences},
     year = {2018},
     volume = {22},
     pages = {01055}}
     
  95. V. Hajihashemi & A.A. Gharahbagh
    A Fast, Block Based, Copy-Move Forgery Detection Approach Using Image Gradient and Modified K-Means
    Intelligent Systems Technologies and Applications
    Springer, 2018
    DOI: 10.1007/978-3-319-68385-0_25
    BibTeX
    @incollection{Hajihashemi2018,
     author = {Hajihashemi, V. and Gharahbagh, A. Alavi},
     title = {A Fast, Block Based, Copy-Move Forgery Detection Approach Using Image Gradient and Modified K-Means},
     booktitle = {Intelligent Systems Technologies and Applications},
     publisher = {Springer},
     year = {2018}}
     
  96. J.G. Han, T.H. Park, Y.H. Moon & I.K. Eom
    Quantization-based Markov feature extraction method for image splicing detection
    Machine Vision and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s00138-018-0911-5
    BibTeX
    @article{Han2018a,
     author = {Han, Jong Goo and Park, Tae Hee and Moon, Yong Ho and Eom, Il Kyu},
     title = {Quantization-based Markov feature extraction method for image splicing detection},
     journal = {Machine Vision and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  97. R. Han, Y. Ke, L. Du, F. Qin & J. Guo
    Exploring the location of object deleted by seam-carving
    Expert Systems with Applications, Elsevier BV, 2018, Vol. 95, pp. 162-171
    DOI: 10.1016/j.eswa.2017.11.023
    BibTeX
    @article{Han2018,
     author = {Han, Rong and Ke, Yongzhen and Du, Ling and Qin, Fan and Guo, Jing},
     title = {Exploring the location of object deleted by seam-carving},
     journal = {Expert Systems with Applications},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {95},
     pages = {162--171}}
     
  98. M. He
    Distinguish computer generated and digital images: A CNN solution
    Concurrency and Computation: Practice and Experience, Wiley, 2018, pp. e4788
    DOI: 10.1002/cpe.4788
    BibTeX
    @article{He2018,
     author = {He, Ming},
     title = {Distinguish computer generated and digital images: A CNN solution},
     journal = {Concurrency and Computation: Practice and Experience},
     publisher = {Wiley},
     year = {2018},
     pages = {e4788}}
     
  99. S. Heller, L. Rossetto & H. Schuldt
    The PS-Battles Dataset - an Image Collection for Image Manipulation Detection
    arXiv, 2018
    arXiv: 1804.04866v1
    BibTeX
    @article{Heller2018,
     author = {Heller, Silvan and Rossetto, Luca and Schuldt, Heiko},
     title = {The PS-Battles Dataset - an Image Collection for Image Manipulation Detection},
     journal = {arXiv},
     year = {2018}}
     
  100. A. Hilal & S. Chantaf
    Uncovering copy–move traces using principal component analysis, discrete cosine transform and Gabor filter
    Analog Integrated Circuits and Signal Processing, Springer, 2018, pp. 1
    DOI: 10.1007/s10470-018-1139-z
    BibTeX
    @article{Hilal2018,
     author = {Hilal, Alaa and Chantaf, Samer},
     title = {Uncovering copy–move traces using principal component analysis, discrete cosine transform and Gabor filter},
     journal = {Analog Integrated Circuits and Signal Processing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  101. M.S. Hossain, G. Muhammad & M. AL Qurishi
    Verifying the Images Authenticity in Cognitive Internet of Things (CIoT)-Oriented Cyber Physical System
    Mobile Networks and Applications, Springer, 2018, Vol. 23(2), pp. 239
    DOI: 10.1007/s11036-017-0928-4
    BibTeX
    @article{Hossain2018,
     author = {Hossain, M. Shamim and Muhammad, Ghulam and AL Qurishi, Muhammad},
     title = {Verifying the Images Authenticity in Cognitive Internet of Things (CIoT)-Oriented Cyber Physical System},
     journal = {Mobile Networks and Applications},
     publisher = {Springer},
     year = {2018},
     volume = {23},
     number = {2},
     pages = {239}}
     
  102. J.-U. Hou, H.-U. Jang, J.-S. Park & H.-K. Lee
    Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks
    Information Security Applications, Springer, 2018
    DOI: 10.1007/978-3-319-93563-8_2
    BibTeX
    @article{Hou2018,
     author = {Hou, Jong-Uk and Jang, Han-Ul and Park, Jin-Seok and Lee, Heung-Kyu},
     title = {Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks},
     journal = {Information Security Applications},
     publisher = {Springer},
     year = {2018}}
     
  103. C.-C. Hsu, C.-Y. Lee & Y.-X. Zhuang
    Learning to Detect Fake Face Images in the Wild
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1809.08754v3
    BibTeX
    @article{Hsu2018,
     author = {Hsu, Chih-Chung and Lee, Chia-Yen and Zhuang, Yi-Xiu},
     title = {Learning to Detect Fake Face Images in the Wild},
     journal = {arXiv},
     year = {2018}}
     
  104. Z. Hu, H. Wu, S. Liao, H. Hu, S. Liu & B. Li
    Person Re-Identification with Hybrid Loss and Hard Triplets Mining
    Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)
    2018, pp. 1-5
    DOI: 10.1109/BigMM.2018.8499463
    BibTeX
    @inproceedings{Hu2018,
     author = {Hu, Z. and Wu, H. and Liao, S. and Hu, H. and Liu, S. and Li, B.},
     title = {Person Re-Identification with Hybrid Loss and Hard Triplets Mining},
     booktitle = {Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)},
     year = {2018},
     pages = {1--5}}
     
  105. N. Huang, J. He & N. Zhu
    A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network
    Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)
    2018, pp. 1702-1705
    DOI: 10.1109/TrustCom/BigDataSE.2018.00255
    BibTeX
    @inproceedings{Huang2018a,
     author = {Huang, N. and He, J. and Zhu, N.},
     title = {A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network},
     booktitle = {Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)},
     year = {2018},
     pages = {1702--1705}}
     
  106. N. Huang, J. He, N. Zhu, X. Xuan, G. Liu & C. Chang
    Identification of the source camera of images based on convolutional neural network
    Digital Investigation, Elsevier BV, 2018, Vol. 26, pp. 72-80
    DOI: 10.1016/j.diin.2018.08.001
    BibTeX
    @article{Huang2018b,
     author = {Huang, Na and He, Jingsha and Zhu, Nafei and Xuan, Xinggang and Liu, Gongzheng and Chang, Chengyue},
     title = {Identification of the source camera of images based on convolutional neural network},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {26},
     pages = {72--80}}
     
  107. Y. Huang, L. Cao, J. Zhang, L. Pan & Y. Liu
    Exploring feature coupling and model coupling for image source identification
    IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(12), pp. 3108-3121
    DOI: 10.1109/TIFS.2018.2838079
    BibTeX
    @article{Huang2018,
     author = {Huang, Y. and Cao, L. and Zhang, J. and Pan, L. and Liu, Y.},
     title = {Exploring feature coupling and model coupling for image source identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {13},
     number = {12},
     pages = {3108--3121}}
     
  108. M. Huh, A. Liu, A. Owens & A.A. Efros
    Fighting Fake News: Image Splice Detection via Learned Self-Consistency
    ArXiv, 2018
    arXiv: 1805.04096v1
    BibTeX
    @article{Huh2018,
     author = {Huh, Minyoung and Liu, Andrew and Owens, Andrew and Efros, Alexei A.},
     title = {Fighting Fake News: Image Splice Detection via Learned Self-Consistency},
     journal = {ArXiv},
     year = {2018}}
     
  109. C. Iakovidou, M. Zampoglou, S. Papadopoulos & Y. Kompatsiaris
    Content-aware detection of JPEG grid inconsistencies for intuitive image forensics
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 54, pp. 155-170
    DOI: 10.1016/j.jvcir.2018.05.011
    BibTeX
    @article{Iakovidou2018,
     author = {Iakovidou, Chryssanthi and Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis},
     title = {Content-aware detection of JPEG grid inconsistencies for intuitive image forensics},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {54},
     pages = {155--170}}
     
  110. M.M. Islam, J. Kamruzzaman, G. Karmakar, M. Murshed & G. Kahandawa
    Passive Detection of Splicing and Copy-Move Attacks in Image Forgery
    Neural Information Processing, Springer, 2018
    DOI: 10.1007/978-3-030-04212-7_49
    BibTeX
    @article{Islam2018,
     author = {Islam, Mohammad Manzurul and Kamruzzaman, Joarder and Karmakar, Gour and Murshed, Manzur and Kahandawa, Gayan},
     title = {Passive Detection of Splicing and Copy-Move Attacks in Image Forgery},
     journal = {Neural Information Processing},
     publisher = {Springer},
     year = {2018}}
     
  111. N.S.A. Izham, A.B.A. Samah & H.B.A. Majid
    Moment Invariant-Based Approach On Distorted Copy-Move Image Forgery By Colored Reduction
    UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
    BibTeX
    @article{Izham2018,
     author = {Izham, Nur Shafiqah Ahmad and Samah, Azurah Binti A. and Majid, H. B. A.},
     title = {Moment Invariant-Based Approach On Distorted Copy-Move Image Forgery By Colored Reduction},
     journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications},
     year = {2018},
     volume = {3}}
     
  112. N.K. Jain, N.K. Rathore & A. Mishra
    An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine
    Wireless Personal Communications, Springer, 2018, pp. 1
    DOI: 10.1007/s11277-018-5802-6
    BibTeX
    @article{Jain2018,
     author = {Jain, Neelesh Kumar and Rathore, Neeraj Kumar and Mishra, Amit},
     title = {An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine},
     journal = {Wireless Personal Communications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  113. H.A. Jalab, A.M. Hasan, Z. Moghaddasi & Z. Wakaf
    Image Splicing Detection Using Electromagnetism-Like Based Descriptor
    Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016
    Springer, 2018
    DOI: 10.1007/978-3-319-56991-8_6
    BibTeX
    @incollection{Jalab2018,
     author = {Jalab, Hamid A. and Hasan, Ali M. and Moghaddasi, Zahra and Wakaf, Zouhir},
     title = {Image Splicing Detection Using Electromagnetism-Like Based Descriptor},
     booktitle = {Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016},
     publisher = {Springer},
     year = {2018}}
     
  114. T.J. Jayan & P.S. Sethu
    Estimation of Spliced Images in Photographs
    Proc. 2nd Int. Conf. Trends in Electronics and Informatics (ICOEI)
    2018, pp. 248-252
    DOI: 10.1109/ICOEI.2018.8553823
    BibTeX
    @inproceedings{Jayan2018,
     author = {Jayan, T. J. and Sethu, P. Sajith},
     title = {Estimation of Spliced Images in Photographs},
     booktitle = {Proc. 2nd Int. Conf. Trends in Electronics and Informatics (ICOEI)},
     year = {2018},
     pages = {248--252}}
     
  115. J.J. Jeon & I.K. Eom
    Wavelet-based color modification detection based on variance ratio
    EURASIP Journal on Image and Video Processing, Springer, 2018, Vol. 2018(1), pp. 1
    DOI: 10.1186/s13640-018-0286-6
    BibTeX
    @article{Jeon2018,
     author = {Jeon, Jong Ju and Eom, Il Kyu},
     title = {Wavelet-based color modification detection based on variance ratio},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2018},
     volume = {2018},
     number = {1},
     pages = {1}}
     
  116. A. Jeyalakshmi & D.D.R. Chitra
    Source Camera Identification using Image Features
    International Journal of Applied Engineering Research, 2018, Vol. 13(1), pp. 490-504
    BibTeX
    @article{Jeyalakshmi12018,
     author = {Jeyalakshmi, A. and Chitra, Dr. D. Ramya},
     title = {Source Camera Identification using Image Features},
     journal = {International Journal of Applied Engineering Research},
     year = {2018},
     volume = {13},
     number = {1},
     pages = {490--504}}
     
  117. A. Jeyalakshmi & D.R. Chitra
    Comparative study of feature extraction using several wavelet transforms for source camera identification
    Proc. 2nd Int. Conf. Inventive Systems and Control (ICISC)
    2018, pp. 1407-1414
    DOI: 10.1109/ICISC.2018.8398923
    BibTeX
    @inproceedings{Jeyalakshmi2018,
     author = {Jeyalakshmi, A. and Chitra, D. R.},
     title = {Comparative study of feature extraction using several wavelet transforms for source camera identification},
     booktitle = {Proc. 2nd Int. Conf. Inventive Systems and Control (ICISC)},
     year = {2018},
     pages = {1407--1414}}
     
  118. S. Jia, Z. Xu, H. Wang, C. Feng & T. Wang
    Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 25323-25335
    DOI: 10.1109/ACCESS.2018.2819624
    BibTeX
    @article{Jia2018,
     author = {Jia, S. and Xu, Z. and Wang, H. and Feng, C. and Wang, T.},
     title = {Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {25323--25335}}
     
  119. X. Jin, Y. Su, L. Zou, C. Zhang, P. Jing & X. Song
    Video logo removal detection based on sparse representation
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5959-8
    BibTeX
    @article{Jin2018,
     author = {Jin, Xiao and Su, Yuting and Zou, Liang and Zhang, Chengqian and Jing, Peiguang and Song, Xuemeng},
     title = {Video logo removal detection based on sparse representation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  120. S. Joshi, G. Gupta & N. Khanna
    Source Classification Using Document Images from Smartphones and Flatbed Scanners
    Communications in Computer and Information Science
    Springer Singapore, 2018, pp. 281-292
    DOI: 10.1007/978-981-13-0020-2_25
    BibTeX
    @incollection{Joshi2018,
     author = {Joshi, Sharad and Gupta, Gaurav and Khanna, Nitin},
     title = {Source Classification Using Document Images from Smartphones and Flatbed Scanners},
     booktitle = {Communications in Computer and Information Science},
     publisher = {Springer Singapore},
     year = {2018},
     pages = {281--292}}
     
  121. K. Karthik & P. Malik
    Purple Fringing Aberration Detection Based on Content-Adaptable Thresholds
    Proceedings of First International Conference on Smart System, Innovations and Computing
    Springer, 2018
    DOI: 10.1007/978-981-10-5828-8_7
    BibTeX
    @incollection{Karthik2018,
     author = {Karthik, Kannan and Malik, Parveen},
     title = {Purple Fringing Aberration Detection Based on Content-Adaptable Thresholds},
     booktitle = {Proceedings of First International Conference on Smart System, Innovations and Computing},
     publisher = {Springer},
     year = {2018}}
     
  122. A. Kaur, S. Walia & K. Kumar
    Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods
    Proc. Eleventh Int. Conf. Contemporary Computing (IC3)
    2018, pp. 1-5
    DOI: 10.1109/IC3.2018.8530489
    BibTeX
    @inproceedings{Kaur2018,
     author = {Kaur, A. and Walia, S. and Kumar, K.},
     title = {Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods},
     booktitle = {Proc. Eleventh Int. Conf. Contemporary Computing (IC3)},
     year = {2018},
     pages = {1--5}}
     
  123. A. Khan, S. Rehman, M. Waleed, A. Khan, U. Khan, T. Kamal, S.K. Afridi & S.N.K. Marwat
    Forensic Video Analysis: Passive Tracking System for Automated Person of Interest (POI) Localization
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 43392-43403
    DOI: 10.1109/ACCESS.2018.2856936
    BibTeX
    @article{Khan2018d,
     author = {Khan, A. and Rehman, S. and Waleed, M. and Khan, A. and Khan, U. and Kamal, T. and Afridi, S. K. and Marwat, S. N. K.},
     title = {Forensic Video Analysis: Passive Tracking System for Automated Person of Interest (POI) Localization},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {43392--43403}}
     
  124. M.J. Khan, A. Yousaf, K. Khurshid, A. Abbas & F. Shafait
    Automated Forgery Detection in Multispectral Document Images Using Fuzzy Clustering
    Proc. 13th IAPR Int. Workshop Document Analysis Systems (DAS)
    2018, pp. 393-398
    DOI: 10.1109/DAS.2018.26
    BibTeX
    @inproceedings{Khan2018b,
     author = {Khan, M. J. and Yousaf, A. and Khurshid, K. and Abbas, A. and Shafait, F.},
     title = {Automated Forgery Detection in Multispectral Document Images Using Fuzzy Clustering},
     booktitle = {Proc. 13th IAPR Int. Workshop Document Analysis Systems (DAS)},
     year = {2018},
     pages = {393--398}}
     
  125. R.M. Khan, W. Iqbal, M.F. Amjad, H. Abbas, H. Afzal, A. Rauf & M. Pasha
    Forensic investigation to detect forgeries in ASF files of contemporary IP cameras
    The Journal of Supercomputing, Springer, 2018, pp. 1
    DOI: 10.1007/s11227-018-2377-7
    BibTeX
    @article{Khan2018,
     author = {Khan, Rashid Masood and Iqbal, Waseem and Amjad, Muhammad Faisal and Abbas, Haider and Afzal, Hammad and Rauf, Abdul and Pasha, Maruf},
     title = {Forensic investigation to detect forgeries in ASF files of contemporary IP cameras},
     journal = {The Journal of Supercomputing},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  126. U.A. Khan, M.A. Kaloi, Z.A. Shaikh & A.A. Arain
    A Hybrid Technique for Copy-Move Image Forgery Detection
    Proc. 3rd Int. Conf. Computer and Communication Systems (ICCCS)
    2018, pp. 212-216
    DOI: 10.1109/CCOMS.2018.8463337
    BibTeX
    @inproceedings{Khan2018a,
     author = {Khan, U. A. and Kaloi, M. A. and Shaikh, Z. A. and Arain, A. A.},
     title = {A Hybrid Technique for Copy-Move Image Forgery Detection},
     booktitle = {Proc. 3rd Int. Conf. Computer and Communication Systems (ICCCS)},
     year = {2018},
     pages = {212--216}}
     
  127. D. Kim, H.U. Jang, S.M. Mun, S. Choi & H.K. Lee
    Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks
    IEEE Signal Processing Letters, 2018, Vol. 25(2), pp. 278-282
    DOI: 10.1109/LSP.2017.2782363
    BibTeX
    @article{Kim2018,
     author = {Kim, D. and Jang, H. U. and Mun, S. M. and Choi, S. and Lee, H. K.},
     title = {Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks},
     journal = {IEEE Signal Processing Letters},
     year = {2018},
     volume = {25},
     number = {2},
     pages = {278--282}}
     
  128. P. Korus
    Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.12915v1
    BibTeX
    @article{Korus2018a,
     author = {Korus, Pawel},
     title = {Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes},
     journal = {arXiv},
     year = {2018}}
     
  129. P. Korus & N. Memon
    Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1812.01516v1
    BibTeX
    @article{Korus2018,
     author = {Korus, Pawel and Memon, Nasir},
     title = {Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels},
     journal = {arXiv},
     year = {2018}}
     
  130. M. Kumar & S. Srivastava
    Image Tampering Detection Based on Inherent Lighting Fingerprints
    Computational Vision and Bio Inspired Computing
    Springer, 2018
    DOI: 10.1007/978-3-319-71767-8_97
    BibTeX
    @incollection{Kumar2018,
     author = {Kumar, Manoj and Srivastava, Sangeet},
     title = {Image Tampering Detection Based on Inherent Lighting Fingerprints},
     booktitle = {Computational Vision and Bio Inspired Computing},
     publisher = {Springer},
     year = {2018}}
     
  131. M. Kumar & S. Srivastava
    Image authentication by assessing manipulations using illumination
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6775-x
    BibTeX
    @article{Kumar2018a,
     author = {Kumar, Manoj and Srivastava, Sangeet},
     title = {Image authentication by assessing manipulations using illumination},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  132. A. Kuzin, A. Fattakhov, I. Kibardin, V. Iglovikov & R. Dautov
    Camera Model Identification Using Convolutional Neural Networks
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1810.02981v2
    BibTeX
    @article{Kuzin2018,
     author = {Kuzin, Artur and Fattakhov, Artur and Kibardin, Ilya and Iglovikov, Vladimir and Dautov, Ruslan},
     title = {Camera Model Identification Using Convolutional Neural Networks},
     journal = {arXiv},
     year = {2018}}
     
  133. A. Kuznetsov & V. Myasnikov
    Satellite Image Forgery Detection Based on Buildings Shadows Analysis
    Analysis of Images, Social Networks and Texts, Springer, 2018
    DOI: 10.1007/978-3-319-73013-4_21
    BibTeX
    @article{Kuznetsov2018,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {Satellite Image Forgery Detection Based on Buildings Shadows Analysis},
     journal = {Analysis of Images, Social Networks and Texts},
     publisher = {Springer},
     year = {2018}}
     
  134. C. Kyrkou, E.G. Christoforou, S. Timotheou, T. Theocharides, C. Panayiotou & M. Polycarpou
    Optimizing the Detection Performance of Smart Camera Networks Through a Probabilistic Image-Based Model
    #IEEE_J_CASVT#, 2018, Vol. 28(5), pp. 1197-1211
    DOI: 10.1109/TCSVT.2017.2651362
    BibTeX
    @article{Kyrkou2018,
     author = {Kyrkou, C. and Christoforou, E. G. and Timotheou, S. and Theocharides, T. and Panayiotou, C. and Polycarpou, M.},
     title = {Optimizing the Detection Performance of Smart Camera Networks Through a Probabilistic Image-Based Model},
     journal = {#IEEE_J_CASVT#},
     year = {2018},
     volume = {28},
     number = {5},
     pages = {1197--1211}}
     
  135. S. Law & N. Law
    PRNU-based source identification for network video surveillance system
    Proc. IEEE Int. Conf. Consumer Electronics (ICCE)
    2018, pp. 1-2
    DOI: 10.1109/ICCE.2018.8326094
    BibTeX
    @inproceedings{Law2018,
     author = {Law, S. and Law, N.},
     title = {PRNU-based source identification for network video surveillance system},
     booktitle = {Proc. IEEE Int. Conf. Consumer Electronics (ICCE)},
     year = {2018},
     pages = {1--2}}
     
  136. J. Li, W. Lu, J. Weng, Y. Mao & G. Li
    Double JPEG compression detection based on block statistics
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6175-2
    BibTeX
    @article{Li2018b,
     author = {Li, Jixian and Lu, Wei and Weng, Jian and Mao, Yijun and Li, Guoqiang},
     title = {Double JPEG compression detection based on block statistics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  137. R. Li, C.-T. Li & Y. Guan
    Inference of a compact representation of sensor fingerprint for source camera identification
    Pattern Recognition, Elsevier BV, 2018, Vol. 74, pp. 556-567
    DOI: 10.1016/j.patcog.2017.09.027
    BibTeX
    @article{Li2018,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {Inference of a compact representation of sensor fingerprint for source camera identification},
     journal = {Pattern Recognition},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {74},
     pages = {556--567}}
     
  138. W. Li, R. Ni, X. Li & Y. Zhao
    Robust median filtering detection based on the difference of frequency residuals
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6831-6
    BibTeX
    @article{Li2018f,
     author = {Li, Wenjie and Ni, Rongrong and Li, Xiaolong and Zhao, Yao},
     title = {Robust median filtering detection based on the difference of frequency residuals},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  139. X. Li, X. Qu, W. Xu, S. Wang, Y. Tong & L. Luo
    Validating the Contextual Information of Outdoor Images for Photo Misuse Detection
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.08951v1
    BibTeX
    @article{Li2018d,
     author = {Li, Xiaopeng and Qu, Xianshan and Xu, Wenyuan and Wang, Song and Tong, Yan and Luo, Lannan},
     title = {Validating the Contextual Information of Outdoor Images for Photo Misuse Detection},
     journal = {arXiv},
     year = {2018}}
     
  140. Y. Li, B. Wang, K. Chong & Y. Guo
    Complexity Based Sample Selection for Camera Source Identification
    Machine Learning and Intelligent Communications, Springer, 2018
    DOI: 10.1007/978-3-319-73564-1_17
    BibTeX
    @article{Li2018a,
     author = {Li, Yabin and Wang, Bo and Chong, Kun and Guo, Yanqing},
     title = {Complexity Based Sample Selection for Camera Source Identification},
     journal = {Machine Learning and Intelligent Communications},
     publisher = {Springer},
     year = {2018}}
     
  141. Y. Li & J. Zhou
    Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching
    #IEEE_J_IFS#, 2018, pp. 1
    DOI: 10.1109/TIFS.2018.2876837
    BibTeX
    @article{Li2018c,
     author = {Li, Y. and Zhou, J.},
     title = {Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching},
     journal = {#IEEE_J_IFS#},
     year = {2018},
     pages = {1}}
     
  142. C. Lin, W. Lu, X. Huang, K. Liu, W. Sun, H. Lin & Z. Tan
    Copy-move forgery detection using combined features and transitive matching
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6922-4
    BibTeX
    @article{Lin2018c,
     author = {Lin, Cong and Lu, Wei and Huang, Xinchao and Liu, Ke and Sun, Wei and Lin, Hanhui and Tan, Zhiyuan},
     title = {Copy-move forgery detection using combined features and transitive matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  143. L. Lin, W. Chen, Y. Wang, S. Reinder, Y. Guan, J. Newman & M. Wu
    The Impact of Exposure Settings in Digital Image Forensics
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 540-544
    DOI: 10.1109/ICIP.2018.8451688
    BibTeX
    @inproceedings{Lin2018b,
     author = {Lin, L. and Chen, W. and Wang, Y. and Reinder, S. and Guan, Y. and Newman, J. and Wu, M.},
     title = {The Impact of Exposure Settings in Digital Image Forensics},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {540--544}}
     
  144. X. Lin
    Image Forgery Detection
    Introductory Computer Forensics
    Springer, 2018
    DOI: 10.1007/978-3-030-00581-8_20
    BibTeX
    @incollection{Lin2018d,
     author = {Lin, Xiaodong},
     title = {Image Forgery Detection},
     booktitle = {Introductory Computer Forensics},
     publisher = {Springer},
     year = {2018}}
     
  145. X. Lin & X. Kang
    Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction
    ACM Trans. Multimedia Comput. Commun. Appl., ACM, 2018, Vol. 14(4), pp. 84:1-84:13
    DOI: 10.1145/3241058
    BibTeX
    @article{Lin2018a,
     author = {Lin, Xiaodan and Kang, Xiangui},
     title = {Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction},
     journal = {ACM Trans. Multimedia Comput. Commun. Appl.},
     publisher = {ACM},
     year = {2018},
     volume = {14},
     number = {4},
     pages = {84:1--84:13}}
     
  146. X. Lin, J.-H. Li, S.-L. Wang, A.-W.-C. Liew, F. Cheng & X.-S. Huang
    Recent Advances in Passive Digital Image Security Forensics: A Brief Review
    Engineering, Elsevier BV, 2018
    DOI: 10.1016/j.eng.2018.02.008
    BibTeX
    @article{Lin2018,
     author = {Lin, Xiang and Li, Jian-Hua and Wang, Shi-Lin and Liew, Alan-Wee-Chung and Cheng, Feng and Huang, Xiao-Sa},
     title = {Recent Advances in Passive Digital Image Security Forensics: A Brief Review},
     journal = {Engineering},
     publisher = {Elsevier BV},
     year = {2018}}
     
  147. B. Liu & C.-M. Pun
    Locating splicing forgery by fully convolutional networks and conditional random field
    Signal Processing: Image Communication, Elsevier BV, 2018
    DOI: 10.1016/j.image.2018.04.011
    BibTeX
    @article{Liu2018,
     author = {Liu, Bo and Pun, Chi-Man},
     title = {Locating splicing forgery by fully convolutional networks and conditional random field},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018}}
     
  148. Q. Liu
    An Improved Approach to Exposing JPEG Seam Carving under Recompression
    #IEEE_J_CASVT#, 2018, pp. 1
    DOI: 10.1109/TCSVT.2018.2859633
    BibTeX
    @article{Liu2018b,
     author = {Liu, Q.},
     title = {An Improved Approach to Exposing JPEG Seam Carving under Recompression},
     journal = {#IEEE_J_CASVT#},
     year = {2018},
     pages = {1}}
     
  149. X. Liu, W. Lu, T. Huang, H. Liu, Y. Xue & Y. Yeung
    Scaling factor estimation on JPEG compressed images by cyclostationarity analysis
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6411-9
    BibTeX
    @article{Liu2018a,
     author = {Liu, Xianjin and Lu, Wei and Huang, Tao and Liu, Hongmei and Xue, Yingjie and Yeung, Yuileong},
     title = {Scaling factor estimation on JPEG compressed images by cyclostationarity analysis},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  150. C. Long, A. Basharat & A. Hoogs
    A Coarse-to-fine Deep Convolutional Neural Network Framework for Frame Duplication Detection and Localization in Video Forgery
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.10762v1
    BibTeX
    @article{Long2018,
     author = {Long, Chengjiang and Basharat, Arslan and Hoogs, Anthony},
     title = {A Coarse-to-fine Deep Convolutional Neural Network Framework for Frame Duplication Detection and Localization in Video Forgery},
     journal = {arXiv},
     year = {2018}}
     
  151. F. Lopez, L. Valent\in & Í.S.M. Mendivil
    Detecting Image Brush Editing Using the Discarded Coefficients and Intentions
    International Journal of Interactive Multimedia and Artificial Intelligence, IMAI Software - International Journal of Interactive Multimedia and Artificial Intelligence, 2018, Vol. {InPress}({InPress}), pp. 1
    DOI: 10.9781/ijimai.2018.08.003
    BibTeX
    @article{Lopez2018,
     author = {Lopez, Fernando and Valent\in, Luis and Mendivil, Ínigo Sarr\ia Mart\inez},
     title = { Detecting Image Brush Editing Using the Discarded Coefficients and Intentions },
     journal = {International Journal of Interactive Multimedia and Artificial Intelligence},
     publisher = {IMAI Software - International Journal of Interactive Multimedia and Artificial Intelligence},
     year = {2018},
     volume = {InPress},
     number = {InPress},
     pages = {1}}
     
  152. T. Mahmood, Z. Mehmood, M. Shah & T. Saba
    A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 53, pp. 202-214
    DOI: 10.1016/j.jvcir.2018.03.015
    BibTeX
    @article{Mahmood2018,
     author = {Mahmood, Toqeer and Mehmood, Zahid and Shah, Mohsin and Saba, Tanzila},
     title = {A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {53},
     pages = {202--214}}
     
  153. C. Maigrot, V. Claveau & E. Kijak
    Fusion-based multimodal detection of hoaxes in social networks
    WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.
    WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile., 2018
    BibTeX
    @conference{Maigrot2018,
     author = {Maigrot, Cédric and Claveau, Vincent and Kijak, Ewa},
     title = {Fusion-based multimodal detection of hoaxes in social networks},
     booktitle = {WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.},
     journal = {WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.},
     year = {2018}}
     
  154. C. Maigrot, E. Kijak & V. Claveau
    Context-Aware Forgery Localization in Social-Media Images: A Feature-Based Approach Evaluation
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 545-549
    DOI: 10.1109/ICIP.2018.8451726
    BibTeX
    @inproceedings{Maigrot2018a,
     author = {Maigrot, C. and Kijak, E. and Claveau, V.},
     title = {Context-Aware Forgery Localization in Social-Media Images: A Feature-Based Approach Evaluation},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {545--549}}
     
  155. S. Mandelli, P. Bestagini, S. Tubaro, D. Cozzolino & L. Verdoliva
    Blind Detection and Localization of Video Temporal Splicing Exploiting Sensor-Based Footprints
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1362-1366
    DOI: 10.23919/EUSIPCO.2018.8553511
    BibTeX
    @inproceedings{Mandelli2018a,
     author = {Mandelli, S. and Bestagini, P. and Tubaro, S. and Cozzolino, D. and Verdoliva, L.},
     title = {Blind Detection and Localization of Video Temporal Splicing Exploiting Sensor-Based Footprints},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1362--1366}}
     
  156. S. Mandelli, P. Bestagini, L. Verdoliva & S. Tubaro
    Facing Device Attribution Problem for Stabilized Video Sequences
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.01820v1
    BibTeX
    @article{Mandelli2018b,
     author = {Mandelli, Sara and Bestagini, Paolo and Verdoliva, Luisa and Tubaro, Stefano},
     title = {Facing Device Attribution Problem for Stabilized Video Sequences},
     journal = {arXiv},
     year = {2018}}
     
  157. S. Mandelli, N. Bonettini, P. Bestagini, V. Lipari & S. Tubaro
    Multiple JPEG Compression Detection Through Task-Driven Non-Negative Matrix Factorization
    Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
    2018, pp. 2106-2110
    DOI: 10.1109/ICASSP.2018.8461904
    BibTeX
    @inproceedings{Mandelli2018,
     author = {Mandelli, S. and Bonettini, N. and Bestagini, P. and Lipari, V. and Tubaro, S.},
     title = {Multiple JPEG Compression Detection Through Task-Driven Non-Negative Matrix Factorization},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics},
     year = {2018},
     pages = {2106--2110}}
     
  158. V.T. Manu & B.M. Mehtre
    Tamper Detection of Social Media Images using Quality Artifacts and Texture Features
    Forensic Science International, Elsevier BV, 2018
    DOI: 10.1016/j.forsciint.2018.11.025
    BibTeX
    @article{Manu2018,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Tamper Detection of Social Media Images using Quality Artifacts and Texture Features},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018}}
     
  159. F. Marra, D. Gragnaniello & L. Verdoliva
    On the vulnerability of deep learning to adversarial attacks for camera model identification
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 65, pp. 240-248
    DOI: 10.1016/j.image.2018.04.007
    BibTeX
    @article{Marra2018,
     author = {Marra, F. and Gragnaniello, D. and Verdoliva, L.},
     title = {On the vulnerability of deep learning to adversarial attacks for camera model identification},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {65},
     pages = {240--248}}
     
  160. M. Mascicpinto & F. Perez-Gonzalez
    Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals
    Proc. 26th European Signal Processing Conf. (EUSIPCO)
    2018, pp. 1352-1356
    DOI: 10.23919/EUSIPCO.2018.8553232
    BibTeX
    @inproceedings{Mascicpinto2018,
     author = {Mascicpinto, M. and Perez-Gonzalez, F.},
     title = {Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals},
     booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)},
     year = {2018},
     pages = {1352--1356}}
     
  161. M. Masciopinto & F. Perez-González
    Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals
    -, 2018
    BibTeX
    @article{Masciopinto2018,
     author = {Masciopinto, Miguel and Perez-González, Fernando},
     title = {Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals},
     journal = {-},
     year = {2018}}
     
  162. O. Mayer, B. Bayar & M.C. Stamm
    Learning Unified Deep-Features for Multiple Forensic Tasks
    Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '18, 2018
    BibTeX
    @article{Mayer2018b,
     author = {Mayer, Owen and Bayar, Belhassen and Stamm, Matthew C.},
     title = {Learning Unified Deep-Features for Multiple Forensic Tasks},
     journal = {Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '18},
     year = {2018}}
     
  163. O. Mayer & M.C. Stamm
    Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration
    IEEE Transactions on Information Forensics and Security, 2018, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2018.2799421
    BibTeX
    @article{Mayer2018,
     author = {Mayer, O. and Stamm, M. C.},
     title = {Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {PP},
     number = {99},
     pages = {1}}
     
  164. O. Mayer & M.C. Stamm
    Learned Forensic Source Similarity for Unknown Camera Models
    Proc of the SIGPORT 2018
    2018
    BibTeX
    @inproceedings{Mayer2018a,
     author = {Mayer, Owen and Stamm, Mathew C.},
     title = {Learned Forensic Source Similarity for Unknown Camera Models},
     booktitle = {Proc of the SIGPORT 2018},
     year = {2018}}
     
  165. O. Mayer & M.C. Stamm
    Learned Forensic Source Similarity for Unknown Camera Models
    Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
    2018, pp. 2012-2016
    DOI: 10.1109/ICASSP.2018.8462585
    BibTeX
    @inproceedings{Mayer2018c,
     author = {Mayer, O. and Stamm, M. C.},
     title = {Learned Forensic Source Similarity for Unknown Camera Models},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics},
     year = {2018},
     pages = {2012--2016}}
     
  166. A. Mazumdar, J. Singh, Y.S. Tomar & P.K. Bora
    Universal Image Manipulation Detection using Deep Siamese Convolutional Neural Network
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1808.06323v2
    BibTeX
    @article{Mazumdar2018,
     author = {Mazumdar, Aniruddha and Singh, Jaya and Tomar, Yosha Singh and Bora, Prabin Kumar},
     title = {Universal Image Manipulation Detection using Deep Siamese Convolutional Neural Network},
     journal = {arXiv},
     year = {2018}}
     
  167. S. McKeown, G. Russell & P. Leimich
    Fingerprinting JPEGs With Optimised Huffman Tables
    The Journal of Digital Forensics, Security and Law, Embry-Riddle Aeronautical University/Hunt Library, 2018
    DOI: 10.15394/jdfsl.2018.1451
    BibTeX
    @article{McKeown2018,
     author = {McKeown, Sean and Russell, Gordon and Leimich, Petra},
     title = {Fingerprinting JPEGs With Optimised Huffman Tables},
     journal = {The Journal of Digital Forensics, Security and Law},
     publisher = {Embry-Riddle Aeronautical University/Hunt Library},
     year = {2018}}
     
  168. A. Mehrish, A.V. Subramanyam & S. Emmanuel
    Robust PRNU estimation from probabilistic raw measurements
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 66, pp. 30-41
    DOI: 10.1016/j.image.2018.04.013
    BibTeX
    @article{Mehrish2018,
     author = {Mehrish, Ambuj and Subramanyam, A. V. and Emmanuel, Sabu},
     title = {Robust PRNU estimation from probabilistic raw measurements},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {66},
     pages = {30--41}}
     
  169. R. Mehta & N. Agarwal
    Splicing Detection for Combined DCT, DWT and Spatial Markov-Features Using Ensemble Classifier
    Procedia Computer Science, Elsevier BV, 2018, Vol. 132, pp. 1695-1705
    DOI: 10.1016/j.procs.2018.05.143
    BibTeX
    @article{Mehta2018,
     author = {Mehta, Rachna and Agarwal, Navneet},
     title = {Splicing Detection for Combined DCT, DWT and Spatial Markov-Features Using Ensemble Classifier},
     journal = {Procedia Computer Science},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {132},
     pages = {1695--1705}}
     
  170. S.E. Middleton, S. Papadopoulos & Y. Kompatsiaris
    Social Computing for Verifying Social Media Content in Breaking News
    IEEE Internet Computing, Institute of Electrical and Electronics Engineers (IEEE), 2018, Vol. 22(2), pp. 83-89
    DOI: 10.1109/mic.2018.112102235
    BibTeX
    @article{Middleton2018,
     author = {Middleton, Stuart E. and Papadopoulos, Symeon and Kompatsiaris, Yiannis},
     title = {Social Computing for Verifying Social Media Content in Breaking News},
     journal = {IEEE Internet Computing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2018},
     volume = {22},
     number = {2},
     pages = {83--89}}
     
  171. A.V. Mire, S.B. Dhok, N.J. Mistry & P.D. Porey
    Automated approach for splicing detection using first digit probability distribution features
    EURASIP Journal on Image and Video Processing, Springer, 2018, Vol. 2018(1), pp. 1
    DOI: 10.1186/s13640-018-0257-y
    BibTeX
    @article{Mire2018,
     author = {Mire, Archana V. and Dhok, Sanjay B. and Mistry, N. J. and Porey, Prakash D.},
     title = {Automated approach for splicing detection using first digit probability distribution features},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2018},
     volume = {2018},
     number = {1},
     pages = {1}}
     
  172. Z. Moghaddasi, H.A. Jalab & R.M. Noor
    Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients
    Neural Computing and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s00521-018-3586-y
    BibTeX
    @article{Moghaddasi2018,
     author = {Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md.},
     title = {Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients},
     journal = {Neural Computing and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  173. T.M. Mohammed, J. Bunk, L. Nataraj, J.H. Bappy, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury & L. Peterson
    Boosting Image Forgery Detection using Resampling Detection and Copy-move analysis
    ArXiv, 2018
    arXiv: 1802.03154v1
    BibTeX
    @article{Mohammed2018,
     author = {Mohammed, Tajuddin Manhar and Bunk, Jason and Nataraj, Lakshmanan and Bappy, Jawadul H. and Flenner, Arjuna and Manjunath, B. S. and Chandrasekaran, Shivkumar and Roy-Chowdhury, Amit K. and Peterson, Lawrence},
     title = {Boosting Image Forgery Detection using Resampling Detection and Copy-move analysis},
     journal = {ArXiv},
     year = {2018}}
     
  174. M. Mohanty, M. Zhang, M.R. Asghar & G. Russello
    PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution
    Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)
    2018, pp. 1202-1207
    DOI: 10.1109/TrustCom/BigDataSE.2018.00166
    BibTeX
    @inproceedings{Mohanty2018,
     author = {Mohanty, M. and Zhang, M. and Asghar, M. R. and Russello, G.},
     title = {PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution},
     booktitle = {Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)},
     year = {2018},
     pages = {1202--1207}}
     
  175. D. Moreira, A. Bharati, J. Brogan, A. Pinto, M. Parowski, K.W. Bowyer, P.J. Flynn, A. Rocha & W.J. Scheirer
    Image Provenance Analysis at Scale
    ArXiv, 2018
    arXiv: 1801.06510v2
    BibTeX
    @article{Moreira2018,
     author = {Moreira, Daniel and Bharati, Aparna and Brogan, Joel and Pinto, Allan and Parowski, Michael and Bowyer, Kevin W. and Flynn, Patrick J. and Rocha, Anderson and Scheirer, Walter J.},
     title = {Image Provenance Analysis at Scale},
     journal = {ArXiv},
     year = {2018}}
     
  176. D.C. Moreira & J.M. Fechine
    A Machine Learning-based Forensic Discriminator of Pornographic and Bikini Images
    Proc. Int. Joint Conf. Neural Networks (IJCNN)
    2018, pp. 1-8
    DOI: 10.1109/IJCNN.2018.8489100
    BibTeX
    @inproceedings{Moreira2018a,
     author = {Moreira, D. C. and Fechine, J. M.},
     title = {A Machine Learning-based Forensic Discriminator of Pornographic and Bikini Images},
     booktitle = {Proc. Int. Joint Conf. Neural Networks (IJCNN)},
     year = {2018},
     pages = {1--8}}
     
  177. A. Morinaga, K. Hara, K. Inoue & K. Urahama
    Classification between natural and graphics images based on generalized Gaussian distributions
    Information Processing Letters, Elsevier BV, 2018, Vol. 138, pp. 31-34
    DOI: 10.1016/j.ipl.2018.05.010
    BibTeX
    @article{Morinaga2018,
     author = {Morinaga, Atsushi and Hara, Kenji and Inoue, Kohei and Urahama, Kiichi},
     title = {Classification between natural and graphics images based on generalized Gaussian distributions},
     journal = {Information Processing Letters},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {138},
     pages = {31--34}}
     
  178. A. Mumcu & I. Savran
    Copy move forgery detection with using FAST key points and SIFT description vectors
    Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
    2018, pp. 1-4
    DOI: 10.1109/SIU.2018.8404363
    BibTeX
    @inproceedings{Mumcu2018,
     author = {Mumcu, A. and Savran, I.},
     title = {Copy move forgery detection with using FAST key points and SIFT description vectors},
     booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2018},
     pages = {1--4}}
     
  179. S. Mushtaq & A.H. Mir
    Copy-Move Detection Using Gray Level Run Length Matrix Features
    Optical and Wireless Technologies, Springer, 2018
    DOI: 10.1007/978-981-10-7395-3_46
    BibTeX
    @article{Mushtaq2018,
     author = {Mushtaq, Saba and Mir, Ajaz Hussain},
     title = {Copy-Move Detection Using Gray Level Run Length Matrix Features},
     journal = {Optical and Wireless Technologies},
     publisher = {Springer},
     year = {2018}}
     
  180. G. Muzaffer, E.S. Erdöl & G. Ulutaş
    A copy-move forgery detection approach based on local intensity order pattern and patchmatch
    Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
    2018, pp. 1-4
    DOI: 10.1109/SIU.2018.8404602
    BibTeX
    @inproceedings{Muzaffer2018,
     author = {Muzaffer, G. and Erdöl, E. S. and Ulutaş, G.},
     title = {A copy-move forgery detection approach based on local intensity order pattern and patchmatch},
     booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2018},
     pages = {1--4}}
     
  181. M. Nasiri & A. Behrad
    Exposing forgeries in soccer images using geometric clues
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6225-9
    BibTeX
    @article{Nasiri2018,
     author = {Nasiri, Morteza and Behrad, Alireza},
     title = {Exposing forgeries in soccer images using geometric clues},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  182. M. Nasiri & A. Behrad
    Using Expectation-Maximization for Exposing Image Forgeries by Revealing Inconsistencies in Shadow Geometry
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018
    DOI: 10.1016/j.jvcir.2018.12.007
    BibTeX
    @article{Nasiri2018a,
     author = {Nasiri, Morteza and Behrad, Alireza},
     title = {Using Expectation-Maximization for Exposing Image Forgeries by Revealing Inconsistencies in Shadow Geometry},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018}}
     
  183. T. Nikoukhah, R.G. von Gioi, M. Colom & J. Morel
    Automatic JPEG Grid Detection with Controlled False Alarms, and Its Image Forensic Applications
    Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
    2018, pp. 378-383
    DOI: 10.1109/MIPR.2018.00083
    BibTeX
    @inproceedings{Nikoukhah2018a,
     author = {Nikoukhah, T. and von Gioi, R. Grompone and Colom, M. and Morel, J.},
     title = {Automatic JPEG Grid Detection with Controlled False Alarms, and Its Image Forensic Applications},
     booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)},
     year = {2018},
     pages = {378--383}}
     
  184. T. Nikoukhah, R.G. von Gioi, M. Colom & J.-M. Morel
    Automatic JPEG grid detection with controlled false alarms, and its image forensic applications
    2018
    BibTeX
    @electronic{Nikoukhah2018,
     author = {Nikoukhah, Tina and von Gioi, Rafael Grompone and Colom, Miguel and Morel, Jean-Michel},
     title = {Automatic JPEG grid detection with controlled false alarms, and its image forensic applications},
     year = {2018}}
     
  185. K.W. Nixon, J. Mao, J. Shen, H. Yang, H. (H. Li & Y. Chen
    SPN dash
    Proceedings of the International Conference on Computer-Aided Design - ICCAD '18
    ACM Press, 2018
    DOI: 10.1145/3240765.3240851
    BibTeX
    @inproceedings{Nixon2018,
     author = {Nixon, Kent W. and Mao, Jiachen and Shen, Juncheng and Yang, Huanrui and Li, Hai (Helen) and Chen, Yiran},
     title = {SPN dash},
     booktitle = {Proceedings of the International Conference on Computer-Aided Design - ICCAD '18},
     publisher = {ACM Press},
     year = {2018}}
     
  186. P. Niyishaka & C. Bhagvati
    Digital Image Forensics Technique for Copy-Move Forgery Detection Using DoG and ORB
    Computer Vision and Graphics, Springer, 2018
    DOI: 10.1007/978-3-030-00692-1_41
    BibTeX
    @article{Niyishaka2018,
     author = {Niyishaka, Patrick and Bhagvati, Chakravarthy},
     title = {Digital Image Forensics Technique for Copy-Move Forgery Detection Using DoG and ORB},
     journal = {Computer Vision and Graphics},
     publisher = {Springer},
     year = {2018}}
     
  187. A. Novozámský & M. Šorel
    Detection of copy-move image modification using JPEG compression model
    Forensic Science International, Elsevier BV, 2018, Vol. 283, pp. 47-57
    DOI: 10.1016/j.forsciint.2017.11.031
    BibTeX
    @article{Novozamsky2018,
     author = {Novozámský, Adam and Šorel, Michal},
     title = {Detection of copy-move image modification using JPEG compression model},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {283},
     pages = {47--57}}
     
  188. J.A. Ojeniyi, B.O. Adedayo, I. Ismaila & A.M. Shafi'i
    Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques
    International Journal of Image, Graphics and Signal Processing, MECS Publisher, 2018, Vol. 10(4), pp. 22-30
    DOI: 10.5815/ijigsp.2018.04.03
    BibTeX
    @article{Ojeniyi2018,
     author = {Ojeniyi, Joseph A. and Adedayo, Bolaji O. and Ismaila, Idris and Shafi'i, Abdulhamid M.},
     title = {Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques},
     journal = {International Journal of Image, Graphics and Signal Processing},
     publisher = {MECS Publisher},
     year = {2018},
     volume = {10},
     number = {4},
     pages = {22--30}}
     
  189. A.H. Oyiza & M.A. Maarof
    An Improved DCT Block Based Technique for Copy-Move Forgery Detection in Medical Images
    International Journal of Innovative Computing, 2018
    BibTeX
    @article{Oyiza2018,
     author = {Oyiza, Abdulraheem Hassanat and Maarof, Mohd Aizaini},
     title = {An Improved DCT Block Based Technique for Copy-Move Forgery Detection in Medical Images},
     journal = {International Journal of Innovative Computing},
     year = {2018}}
     
  190. S. Panda & M. Mishra
    Passive Techniques of Digital Image Forgery Detection: Developments and Challenges
    Advances in Electronics, Communication and Computing
    Springer, 2018
    DOI: 10.1007/978-981-10-4765-7_29
    BibTeX
    @incollection{Panda2018,
     author = {Panda, Santoshini and Mishra, Minati},
     title = {Passive Techniques of Digital Image Forgery Detection: Developments and Challenges},
     booktitle = {Advances in Electronics, Communication and Computing},
     publisher = {Springer},
     year = {2018}}
     
  191. A. Parashar, A.K. Upadhyay & K. Gupta
    An effectual classification approach to detect copy-move forgery using support vector machines
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6707-9
    BibTeX
    @article{Parashar2018,
     author = {Parashar, Amrita and Upadhyay, Arvind Kumar and Gupta, Kamlesh},
     title = {An effectual classification approach to detect copy-move forgery using support vector machines},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  192. H.M.S. Parvez, S. Sadeghi, H.A. Jalab, A.R. Al-Shamasneh & D.M. Uliyan
    Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering
    Proc. Int. Conf. Smart Computing and Electronic Enterprise (ICSCEE)
    2018, pp. 1-6
    DOI: 10.1109/ICSCEE.2018.8538432
    BibTeX
    @inproceedings{Parvez2018,
     author = {Parvez, H. M. S. and Sadeghi, S. and Jalab, H. A. and Al-Shamasneh, A. R. and Uliyan, D. M.},
     title = {Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering},
     booktitle = {Proc. Int. Conf. Smart Computing and Electronic Enterprise (ICSCEE)},
     year = {2018},
     pages = {1--6}}
     
  193. B. Peng, W. Wang, J. Dong & T. Tan
    Image Forensics Based on Planar Contact Constraints of 3D Objects
    IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(2), pp. 377-392
    DOI: 10.1109/TIFS.2017.2752728
    BibTeX
    @article{Peng2018,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Image Forensics Based on Planar Contact Constraints of 3D Objects},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     volume = {13},
     number = {2},
     pages = {377--392}}
     
  194. F. Peng, L.-b. Zhang & M. Long
    FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.07665v1
    BibTeX
    @article{Peng2018a,
     author = {Peng, Fei and Zhang, Le-bing and Long, Min},
     title = {FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image},
     journal = {arXiv},
     year = {2018}}
     
  195. N.T. Pham, J.-W. Lee, G.-R. Kwon & C.-S. Park
    Efficient image splicing detection algorithm based on markov features
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6792-9
    BibTeX
    @article{Pham2018,
     author = {Pham, Nam Thanh and Lee, Jong-Weon and Kwon, Goo-Rak and Park, Chun-Su},
     title = {Efficient image splicing detection algorithm based on markov features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  196. Q.-T. Phan, G. Boato & F.G.B.D. Natale
    Accurate and Scalable Image Clustering Based On Sparse Representation of Camera Fingerprint
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1810.07945v1
    BibTeX
    @article{Phan2018,
     author = {Phan, Quoc-Tin and Boato, Giulia and Natale, Francesco G. B. De},
     title = {Accurate and Scalable Image Clustering Based On Sparse Representation of Camera Fingerprint},
     journal = {arXiv},
     year = {2018}}
     
  197. T. Pomari, G. Ruppert, E. Rezende, A. Rocha & T. Carvalho
    Image Splicing Detection Through Illumination Inconsistencies and Deep Learning
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 3788-3792
    DOI: 10.1109/ICIP.2018.8451227
    BibTeX
    @inproceedings{Pomari2018,
     author = {Pomari, T. and Ruppert, G. and Rezende, E. and Rocha, A. and Carvalho, T.},
     title = {Image Splicing Detection Through Illumination Inconsistencies and Deep Learning},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {3788--3792}}
     
  198. C.S. Prakash, A. Kumar, S. Maheshkar & V. Maheshkar
    An integrated method of copy-move and splicing for image forgery detection
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5899-3
    BibTeX
    @article{Prakash2018,
     author = {Prakash, Choudhary Shyam and Kumar, Avinash and Maheshkar, Sushila and Maheshkar, Vikas},
     title = {An integrated method of copy-move and splicing for image forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  199. C.S. Prakash, H. Om, S. Maheshkar & V. Maheshkar
    Keypoint-based passive method for image manipulation detection
    Song, T. (ed.)
    Cogent Engineering, Cogent OA, 2018, Vol. 5(1), pp. 1-19
    DOI: 10.1080/23311916.2018.1523346
    BibTeX
    @article{Prakash2018a,
     author = {Prakash, Choudhary Shyam and Om, Hari and Maheshkar, Sushila and Maheshkar, Vikas},
     title = {Keypoint-based passive method for image manipulation detection},
     journal = {Cogent Engineering},
     publisher = {Cogent OA},
     year = {2018},
     volume = {5},
     number = {1},
     pages = {1--19}}
     
  200. N. Privman-Horesh, A. Haider & H. Hel-Or
    Forgery detection in 3D-sensor images
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
    2018
    BibTeX
    @inproceedings{Privman-Horesh2018,
     author = {Privman-Horesh, Noa and Haider, Azmi and Hel-Or, Hagit},
     title = {Forgery detection in 3D-sensor images},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018},
     year = {2018}}
     
  201. T. Qiao, R. Shi, X. Luo, M. Xu, N. Zheng & Y. Wu
    Statistical Model-based Detector via Texture Weight Map: Application in Re-sampling Authentication
    IEEE Transactions on Multimedia, 2018, pp. 1
    DOI: 10.1109/TMM.2018.2872863
    BibTeX
    @article{Qiao2018,
     author = {Qiao, T. and Shi, R. and Luo, X. and Xu, M. and Zheng, N. and Wu, Y.},
     title = {Statistical Model-based Detector via Texture Weight Map: Application in Re-sampling Authentication},
     journal = {IEEE Transactions on Multimedia},
     year = {2018},
     pages = {1}}
     
  202. W. Quan, K. Wang, D.M. Yan & X. Zhang
    Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks
    #IEEE_J_IFS#, 2018, Vol. 13(11), pp. 2772-2787
    DOI: 10.1109/TIFS.2018.2834147
    BibTeX
    @article{Quan2018,
     author = {Quan, W. and Wang, K. and Yan, D. M. and Zhang, X.},
     title = {Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks},
     journal = {#IEEE_J_IFS#},
     year = {2018},
     volume = {13},
     number = {11},
     pages = {2772--2787}}
     
  203. P. Raja Mani & D. Lalitha Bhaskari
    A Prototype for Image Tamper Detection with Self-generated Verification Code Using Gödelization
    Smart Computing and Informatics
    Springer, 2018
    DOI: 10.1007/978-981-10-5547-8_23
    BibTeX
    @incollection{RajaMani2018,
     author = {Raja Mani, P. and Lalitha Bhaskari, D.},
     title = {A Prototype for Image Tamper Detection with Self-generated Verification Code Using Gödelization},
     booktitle = {Smart Computing and Informatics},
     publisher = {Springer},
     year = {2018}}
     
  204. P.M. Raju & M.S. Nair
    Copy-move forgery detection using binary discriminant features
    Journal of King Saud University - Computer and Information Sciences, Elsevier BV, 2018
    DOI: 10.1016/j.jksuci.2018.11.004
    BibTeX
    @article{Raju2018,
     author = {Raju, Priya Mariam and Nair, Madhu S.},
     title = {Copy-move forgery detection using binary discriminant features},
     journal = {Journal of King Saud University - Computer and Information Sciences},
     publisher = {Elsevier BV},
     year = {2018}}
     
  205. S. Ramakrishnan & S. Nithya
    Two improved extension of local binary pattern descriptors using wavelet transform for texture classification
    IET Image Proc, 2018, Vol. 12(11), pp. 2002-2010
    DOI: 10.1049/iet-ipr.2018.5410
    BibTeX
    @article{Ramakrishnan2018,
     author = {Ramakrishnan, S. and Nithya, S.},
     title = {Two improved extension of local binary pattern descriptors using wavelet transform for texture classification},
     journal = {IET Image Proc},
     year = {2018},
     volume = {12},
     number = {11},
     pages = {2002--2010}}
     
  206. S. Ranjan, P. Garhwal, M. Arora & A. Mehra
    Image Processing based forensic investigation of morphed documents
    Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics
    2018, pp. 1384-1389
    DOI: 10.1109/ICECA.2018.8474811
    BibTeX
    @inproceedings{Ranjan2018,
     author = {Ranjan, S. and Garhwal, P. and Arora, M. and Mehra, A.},
     title = {Image Processing based forensic investigation of morphed documents},
     booktitle = {Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics},
     year = {2018},
     pages = {1384--1389}}
     
  207. A. Rössler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies & M. Nießner
    FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1803.09179v1
    BibTeX
    @article{Roessler2018,
     author = {Rössler, Andreas and Cozzolino, Davide and Verdoliva, Luisa and Riess, Christian and Thies, Justus and Nießner, Matthias},
     title = {FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces},
     journal = {arXiv},
     year = {2018}}
     
  208. A. Roy, D.B. Tariang, R.S. Chakraborty & R. Naskar
    Discrete cosine transform residual feature based filtering forgery and splicing detection in JPEG images
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
    2018
    BibTeX
    @inproceedings{Roy2018,
     author = {Roy, Aniket and Tariang, Diangarti Bhalang and Chakraborty, Rajat Subhra and Naskar, Ruchira},
     title = {Discrete cosine transform residual feature based filtering forgery and splicing detection in JPEG images},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018},
     year = {2018}}
     
  209. K. Saini & S.P. Kaur
    Examination of digitally manipulated documents using matlab 7.10.0 and adobe photoshop 7.0
    Problems of Forensic Sciences, 2018
    BibTeX
    @article{Saini2018,
     author = {Saini, Komal and Kaur, Shabman Preet},
     title = {Examination of digitally manipulated documents using matlab 7.10.0 and adobe photoshop 7.0},
     journal = {Problems of Forensic Sciences},
     year = {2018}}
     
  210. S.F.M. Salleh, M.F. Rohani & M.A.M. Maarof
    Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques
    International Journal of Innovative Computing, Penerbit UTM Press, 2018, Vol. 8(3)
    DOI: 10.11113/ijic.v8n3.213
    BibTeX
    @article{Salleh2018,
     author = {Salleh, Siti Fadzlun Md and Rohani, Mohd Foad and Maarof, Mohd Aizaini Maarof},
     title = {Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques},
     journal = {International Journal of Innovative Computing},
     publisher = {Penerbit UTM Press},
     year = {2018},
     volume = {8},
     number = {3}}
     
  211. R. Salloum, Y. Ren & C.-C.J. Kuo
    Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN)
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 51, pp. 201-209
    DOI: 10.1016/j.jvcir.2018.01.010
    BibTeX
    @article{Salloum2018,
     author = {Salloum, Ronald and Ren, Yuzhuo and Kuo, C.-C. Jay},
     title = {Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN)},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {51},
     pages = {201--209}}
     
  212. A. Samčović
    A Survey on Blind Digital Photographs Forensics Based on Image Analysis
    Proc of the SIGNAL 2018 : The Third International Conference on Advances in Signal, Image and Video Processing
    2018
    BibTeX
    @inproceedings{Samcovic2018,
     author = {Samčović, Andreja},
     title = {A Survey on Blind Digital Photographs Forensics Based on Image Analysis},
     booktitle = {Proc of the SIGNAL 2018 : The Third International Conference on Advances in Signal, Image and Video Processing},
     year = {2018}}
     
  213. V.U. Sameer, I. Dali & R. Naskar
    A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images
    Information Systems Security, Springer, 2018
    DOI: 10.1007/978-3-030-05171-6_15
    BibTeX
    @article{Sameer2018a,
     author = {Sameer, Venkata Udaya and Dali, Ishaan and Naskar, Ruchira},
     title = {A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images},
     journal = {Information Systems Security},
     publisher = {Springer},
     year = {2018}}
     
  214. V.U. Sameer & R. Naskar
    Universal Wavelet Relative Distortion: A New Counter–Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification
    Information Security Practice and Experience, Springer, 2018
    DOI: 10.1007/978-3-319-99807-7_3
    BibTeX
    @article{Sameer2018,
     author = {Sameer, Venkata Udaya and Naskar, Ruchira},
     title = {Universal Wavelet Relative Distortion: A New Counter–Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification},
     journal = {Information Security Practice and Experience},
     publisher = {Springer},
     year = {2018}}
     
  215. G. Schaefer
    UCID-RAW – A Colour Image Database in Raw Format
    VipIMAGE 2017
    Springer, 2018
    DOI: 10.1007/978-3-319-68195-5_19
    BibTeX
    @incollection{Schaefer2018,
     author = {Schaefer, Gerald},
     title = {UCID-RAW – A Colour Image Database in Raw Format},
     booktitle = {VipIMAGE 2017},
     publisher = {Springer},
     year = {2018}}
     
  216. U. Scherhag, D. Budhrani, M. Gomez-Barrero & C. Busch
    Detecting Morphed Face Images Using Facial Landmarks
    Image and Signal Processing, Springer, 2018
    DOI: 10.1007/978-3-319-94211-7_48
    BibTeX
    @article{Scherhag2018,
     author = {Scherhag, Ulrich and Budhrani, Dhanesh and Gomez-Barrero, Marta and Busch, Christoph},
     title = {Detecting Morphed Face Images Using Facial Landmarks},
     journal = {Image and Signal Processing},
     publisher = {Springer},
     year = {2018}}
     
  217. V.C. Schetinger
    Beyond Digital, Images, and Forensics: Towards a Regulation of Trust in Multimedia Communication
    Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação, Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação, 2018
    BibTeX
    @phdthesis{Schetinger2018,
     author = {Schetinger, Victor Chitolina},
     title = {Beyond Digital, Images, and Forensics: Towards a Regulation of Trust in Multimedia Communication},
     school = {Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação},
     year = {2018}}
     
  218. P. Schöttle, A. Schlögl, C. Pasquini & R. Böhme
    Detecting Adversarial Examples - A Lesson from Multimedia Forensics
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1803.03613v1
    BibTeX
    @article{Schoettle2018,
     author = {Schöttle, Pascal and Schlögl, Alexander and Pasquini, Cecilia and Böhme, Rainer},
     title = {Detecting Adversarial Examples - A Lesson from Multimedia Forensics},
     journal = {arXiv},
     year = {2018}}
     
  219. S. Setumin & S.A. Suandi
    Difference of Gaussian Oriented Gradient Histogram for Face Sketch to Photo Matching
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 39344-39352
    DOI: 10.1109/ACCESS.2018.2855208
    BibTeX
    @article{Setumin2018,
     author = {Setumin, S. and Suandi, S. A.},
     title = {Difference of Gaussian Oriented Gradient Histogram for Face Sketch to Photo Matching},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {39344--39352}}
     
  220. A. Shah & E. El-Alfy
    Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP
    Proc. Int. Conf. Computing Sciences and Engineering (ICCSE)
    2018, pp. 1-6
    DOI: 10.1109/ICCSE1.2018.8374214
    BibTeX
    @inproceedings{Shah2018,
     author = {Shah, A. and El-Alfy, E.},
     title = {Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP},
     booktitle = {Proc. Int. Conf. Computing Sciences and Engineering (ICCSE)},
     year = {2018},
     pages = {1--6}}
     
  221. O. Shaya, P. Yang, R. Ni, Y. Zhao & A. Piva
    A New Dataset for Source Identification of High Dynamic Range Images
    Sensors, MDPI AG, 2018, Vol. 18(11), pp. 3801
    DOI: 10.3390/s18113801
    BibTeX
    @article{Shaya2018,
     author = {Shaya, Omar and Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Piva, Alessandro},
     title = {A New Dataset for Source Identification of High Dynamic Range Images},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2018},
     volume = {18},
     number = {11},
     pages = {3801}}
     
  222. C. Shen, M. Kasra, W. Pan, G.A. Bassett, Y. Malloch & J.F. O'Brien
    Fake images: The effects of source, intermediary, and digital media literacy on contextual assessment of image credibility online
    New Media & Society, SAGE Publications, 2018, pp. 146144481879952
    DOI: 10.1177/1461444818799526
    BibTeX
    @article{Shen2018,
     author = {Shen, Cuihua and Kasra, Mona and Pan, Wenjing and Bassett, Grace A. and Malloch, Yining and O'Brien, James F.},
     title = {Fake images: The effects of source, intermediary, and digital media literacy on contextual assessment of image credibility online},
     journal = {New Media & Society},
     publisher = {SAGE Publications},
     year = {2018},
     pages = {146144481879952}}
     
  223. H. Sheng, X. Shen & Z. Shi
    Image Splicing Detection Based on the Q-Markov Features
    Advances in Multimedia Information Processing – PCM 2018
    Springer International Publishing, 2018, pp. 453-464
    DOI: 10.1007/978-3-030-00767-6_42
    BibTeX
    @incollection{Sheng2018,
     author = {Sheng, Hongda and Shen, Xuanjing and Shi, Zenan},
     title = {Image Splicing Detection Based on the Q-Markov Features},
     booktitle = {Advances in Multimedia Information Processing – PCM 2018},
     publisher = {Springer International Publishing},
     year = {2018},
     pages = {453--464}}
     
  224. Z. Shi, X. Shen, H. Kang & Y. Lv
    Image Manipulation Detection and Localization Based on the Dual-Domain Convolutional Neural Networks
    IEEE Access, 2018, pp. 1
    DOI: 10.1109/ACCESS.2018.2883588
    BibTeX
    @article{Shi2018,
     author = {Shi, Z. and Shen, X. and Kang, H. and Lv, Y.},
     title = {Image Manipulation Detection and Localization Based on the Dual-Domain Convolutional Neural Networks},
     journal = {IEEE Access},
     year = {2018},
     pages = {1}}
     
  225. C. Shyam Prakash, S. Maheshkar & V. Maheshkar
    Image Manipulation Detection Using Harris Corner and ANMS
    Advances in Machine Learning and Data Science
    Springer, 2018
    DOI: 10.1007/978-981-10-8569-7_9
    BibTeX
    @incollection{ShyamPrakash2018,
     author = {Shyam Prakash, Choudhary and Maheshkar, Sushila and Maheshkar, Vikas},
     title = {Image Manipulation Detection Using Harris Corner and ANMS},
     booktitle = {Advances in Machine Learning and Data Science},
     publisher = {Springer},
     year = {2018}}
     
  226. A. Singh, G. Singh & K. Singh
    A Markov based image forgery detection approach by analyzing CFA artifacts
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6075-5
    BibTeX
    @article{Singh2018a,
     author = {Singh, Amneet and Singh, Gurinder and Singh, Kulbir},
     title = {A Markov based image forgery detection approach by analyzing CFA artifacts},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  227. G. Singh & K. Singh
    Counter JPEG anti-forensic approach based on the second-order statistical analysis
    IEEE Transactions on Information Forensics and Security, 2018, pp. 1
    DOI: 10.1109/TIFS.2018.2871751
    BibTeX
    @article{Singh2018c,
     author = {Singh, G. and Singh, K.},
     title = {Counter JPEG anti-forensic approach based on the second-order statistical analysis},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     pages = {1}}
     
  228. N. Singh, A. Gupta & R.C. Jain
    Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients
    Advances in Electrical and Electronic Engineering, VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences, 2018, Vol. 16(1)
    DOI: 10.15598/aeee.v16i1.2647
    BibTeX
    @article{Singh2018,
     author = {Singh, Neetu and Gupta, Abhinav and Jain, Roop Chand},
     title = {Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients},
     journal = {Advances in Electrical and Electronic Engineering},
     publisher = {VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences},
     year = {2018},
     volume = {16},
     number = {1}}
     
  229. P.K. Singh, B. Jana & S.H. Jana
    Copy Move Forgery Detection through Graph Neighborhood Degree
    International Journal of Applied Engineering Research, 2018
    BibTeX
    @article{Singh2018d,
     author = {Singh, Prabhash Kumar and Jana, Biswapati and Jana, Sharmistha Halder},
     title = {Copy Move Forgery Detection through Graph Neighborhood Degree},
     journal = {International Journal of Applied Engineering Research},
     year = {2018}}
     
  230. R.D. Singh & N. Aggarwal
    Video content authentication techniques: a comprehensive survey
    Multimedia Systems, Springer, 2018, Vol. 24(2), pp. 211
    DOI: 10.1007/s00530-017-0538-9
    BibTeX
    @article{Singh2018b,
     author = {Singh, Raahat Devender and Aggarwal, Naveen},
     title = {Video content authentication techniques: a comprehensive survey},
     journal = {Multimedia Systems},
     publisher = {Springer},
     year = {2018},
     volume = {24},
     number = {2},
     pages = {211}}
     
  231. B. Soni & D. Biswas
    Image Forensic using Block-based Copy-move Forgery Detection
    Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2018, pp. 888-893
    DOI: 10.1109/SPIN.2018.8474287
    BibTeX
    @inproceedings{Soni2018c,
     author = {Soni, B. and Biswas, D.},
     title = {Image Forensic using Block-based Copy-move Forgery Detection},
     booktitle = {Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2018},
     pages = {888--893}}
     
  232. B. Soni, P.K. Das & D.M. Thounaojam
    CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection
    IET Image Proc, 2018, Vol. 12(2), pp. 167-178
    DOI: 10.1049/iet-ipr.2017.0441
    BibTeX
    @article{Soni2018,
     author = {Soni, B. and Das, P. K. and Thounaojam, D. M.},
     title = {CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection},
     journal = {IET Image Proc},
     year = {2018},
     volume = {12},
     number = {2},
     pages = {167--178}}
     
  233. B. Soni, P.K. Das & D.M. Thounaojam
    multiCMFD: : fast and efficient system for multiple copy-move forgeries detection in image
    Proceedings of the 2018 International Conference on Image and Graphics Processing - ICIGP 2018
    ACM Press, 2018
    DOI: 10.1145/3191442.3191465
    BibTeX
    @inproceedings{Soni2018a,
     author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei},
     title = {multiCMFD: : fast and efficient system for multiple copy-move forgeries detection in image},
     booktitle = {Proceedings of the 2018 International Conference on Image and Graphics Processing - ICIGP 2018},
     publisher = {ACM Press},
     year = {2018}}
     
  234. B. Soni, P.K. Das & D.M. Thounaojam
    An Efficient Block Phase Correlation Approach for CMFD System
    Progress in Computing, Analytics and Networking, Springer, 2018
    DOI: 10.1007/978-981-10-7871-2_5
    BibTeX
    @article{Soni2018b,
     author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei},
     title = {An Efficient Block Phase Correlation Approach for CMFD System},
     journal = {Progress in Computing, Analytics and Networking},
     publisher = {Springer},
     year = {2018}}
     
  235. B. Soni, P.K. Das & D.M. Thounaojam
    Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm
    IET Image Proc, 2018, Vol. 12(11), pp. 2092-2099
    DOI: 10.1049/iet-ipr.2018.5576
    BibTeX
    @article{Soni2018e,
     author = {Soni, B. and Das, P. K. and Thounaojam, D. M.},
     title = {Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm},
     journal = {IET Image Proc},
     year = {2018},
     volume = {12},
     number = {11},
     pages = {2092--2099}}
     
  236. B. Soni, P.K. Das & D.M. Thounaojam
    Improved Block-based Technique using SURF and FAST Keypoints Matching for Copy-Move Attack Detection
    Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2018, pp. 197-202
    DOI: 10.1109/SPIN.2018.8474093
    BibTeX
    @inproceedings{Soni2018f,
     author = {Soni, B. and Das, P. K. and Thounaojam, D. Meitei},
     title = {Improved Block-based Technique using SURF and FAST Keypoints Matching for Copy-Move Attack Detection},
     booktitle = {Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2018},
     pages = {197--202}}
     
  237. T. Sridevi & B.R. Krishna
    A Novel Approach for Detection of Copy-Move Forgery Detection using Transform Domain
    Proc. Second Int. Conf. Inventive Communication and Computational Technologies (ICICCT)
    2018, pp. 1727-1731
    DOI: 10.1109/ICICCT.2018.8473051
    BibTeX
    @inproceedings{Sridevi2018,
     author = {Sridevi, T. and Krishna, B. R.},
     title = {A Novel Approach for Detection of Copy-Move Forgery Detection using Transform Domain},
     booktitle = {Proc. Second Int. Conf. Inventive Communication and Computational Technologies (ICICCT)},
     year = {2018},
     pages = {1727--1731}}
     
  238. M. Stamm, P. Bestagini, L. Marcenaro & P. Campisi
    Forensic Camera Model Identification: Highlights from the IEEE Signal Processing Cup 2018 Student Competition [SP Competitions]
    IEEE Signal Processing Magazine, 2018, Vol. 35(5), pp. 168-174
    DOI: 10.1109/MSP.2018.2847326
    BibTeX
    @article{Stamm2018,
     author = {Stamm, M. and Bestagini, P. and Marcenaro, L. and Campisi, P.},
     title = {Forensic Camera Model Identification: Highlights from the IEEE Signal Processing Cup 2018 Student Competition [SP Competitions]},
     journal = {IEEE Signal Processing Magazine},
     year = {2018},
     volume = {35},
     number = {5},
     pages = {168--174}}
     
  239. A. Stanislaus, H.A. Majid & A.A. Samah
    Binary Discrete Cosine Transform Approach In Copy-Move Image Forgery: A Case Study Of Colour Contrast Adjustment
    UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
    BibTeX
    @article{Stanislaus2018,
     author = {Stanislaus, Abner and Majid, Hairudin Abdul and Samah, Azurah A.},
     title = {Binary Discrete Cosine Transform Approach In Copy-Move Image Forgery: A Case Study Of Colour Contrast Adjustment},
     journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications},
     year = {2018},
     volume = {3}}
     
  240. J.-Y. Sun, S.-W. Kim, S.-W. Lee & S.-J. Ko
    A novel contrast enhancement forensics based on convolutional neural networks
    Signal Processing: Image Communication, Elsevier BV, 2018
    DOI: 10.1016/j.image.2018.02.001
    BibTeX
    @article{Sun2018a,
     author = {Sun, Jee-Young and Kim, Seung-Wook and Lee, Sang-Won and Ko, Sung-Jea},
     title = {A novel contrast enhancement forensics based on convolutional neural networks},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018}}
     
  241. P. Sun, Y. Lang, S. Fan, Z. Shen, L. Liu, D. Shan & S. Peng
    Exposing splicing forgery based on color temperature estimation
    Forensic Science International, Elsevier BV, 2018, Vol. 289, pp. 1-11
    DOI: 10.1016/j.forsciint.2018.04.049
    BibTeX
    @article{Sun2018b,
     author = {Sun, Peng and Lang, Yubo and Fan, Shu and Shen, Zhe and Liu, Lei and Shan, Daguo and Peng, Silong},
     title = {Exposing splicing forgery based on color temperature estimation},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {289},
     pages = {1--11}}
     
  242. Y. Sun, R. Ni & Y. Zhao
    Nonoverlapping Blocks Based Copy-Move Forgery Detection
    Security and Communication Networks, Hindawi Limited, 2018, Vol. 2018, pp. 1-11
    DOI: 10.1155/2018/1301290
    BibTeX
    @article{Sun2018,
     author = {Sun, Yu and Ni, Rongrong and Zhao, Yao},
     title = {Nonoverlapping Blocks Based Copy-Move Forgery Detection},
     journal = {Security and Communication Networks},
     publisher = {Hindawi Limited},
     year = {2018},
     volume = {2018},
     pages = {1--11}}
     
  243. A. Taimori & F. Marvasti
    Forensic Discrimination between Traditional and Compressive Imaging Systems
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1811.03157v1
    BibTeX
    @article{Taimori2018,
     author = {Taimori, Ali and Marvasti, Farokh},
     title = {Forensic Discrimination between Traditional and Compressive Imaging Systems},
     journal = {arXiv},
     year = {2018}}
     
  244. H. Tang, R. Ni, Y. Zhao & X. Li
    Median Filtering Detection of Small-Size Image based on CNN
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018
    DOI: 10.1016/j.jvcir.2018.01.011
    BibTeX
    @article{Tang2018,
     author = {Tang, Hongshen and Ni, Rongrong and Zhao, Yao and Li, Xiaolong},
     title = {Median Filtering Detection of Small-Size Image based on CNN},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018}}
     
  245. X. Tang & W. Zhang
    A Novel Decision Fusion Method for Image Forgery Localization
    Proc. 37th Chinese Control Conf. (CCC)
    2018, pp. 9337-9342
    DOI: 10.23919/ChiCC.2018.8482949
    BibTeX
    @inproceedings{Tang2018a,
     author = {Tang, X. and Zhang, W.},
     title = {A Novel Decision Fusion Method for Image Forgery Localization},
     booktitle = {Proc. 37th Chinese Control Conf. (CCC)},
     year = {2018},
     pages = {9337--9342}}
     
  246. S. Tariq, S. Lee, H. Kim, Y. Shin & S.S. Woo
    Detecting Both Machine and Human Created Fake Face Images In the Wild
    Proceedings of the 2nd International Workshop on Multimedia Privacy and Security - MPS '18
    ACM Press, 2018
    DOI: 10.1145/3267357.3267367
    BibTeX
    @inproceedings{Tariq2018,
     author = {Tariq, Shahroz and Lee, Sangyup and Kim, Hoyoung and Shin, Youjin and Woo, Simon S.},
     title = {Detecting Both Machine and Human Created Fake Face Images In the Wild},
     booktitle = {Proceedings of the 2nd International Workshop on Multimedia Privacy and Security - MPS '18},
     publisher = {ACM Press},
     year = {2018}}
     
  247. S. Teerakanok & T. Uehara
    Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research
    Proc. IEEE 42nd Annual Computer Software and Applications Conf. (COMPSAC)
    2018, Vol. 02, pp. 365-369
    DOI: 10.1109/COMPSAC.2018.10259
    BibTeX
    @inproceedings{Teerakanok2018,
     author = {Teerakanok, S. and Uehara, T.},
     title = {Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research},
     booktitle = {Proc. IEEE 42nd Annual Computer Software and Applications Conf. (COMPSAC)},
     year = {2018},
     volume = {02},
     pages = {365--369}}
     
  248. S. Teerakanok & T. Uehara
    Enhancement of Media Splicing Detection: A General Framework
    The Journal of Digital Forensics, Security and Law, Embry-Riddle Aeronautical University/Hunt Library, 2018
    DOI: 10.15394/jdfsl.2018.1481
    BibTeX
    @article{Teerakanok2018a,
     author = {Teerakanok, Songpon and Uehara, Tetsutaro},
     title = {Enhancement of Media Splicing Detection: A General Framework},
     journal = {The Journal of Digital Forensics, Security and Law},
     publisher = {Embry-Riddle Aeronautical University/Hunt Library},
     year = {2018}}
     
  249. K. Tejas, C. Swathi & M. Rajesh Kumar
    Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations
    arXiv, 2018
    arXiv: http://arxiv.org/abs/1806.02907v1
    BibTeX
    @article{Tejas2018,
     author = {Tejas, K. and Swathi, C. and Rajesh Kumar, M.},
     title = {Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations},
     journal = {arXiv},
     year = {2018}}
     
  250. A. Thakur & N. Jindal
    Image forensics using color illumination, block and key point based approach
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5836-5
    BibTeX
    @article{Thakur2018,
     author = {Thakur, Abhishek and Jindal, Neeru},
     title = {Image forensics using color illumination, block and key point based approach},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  251. V.T.K. Thekkekoodathil & P.K. Vijayaragavan
    A Model of Legal and Procedural Framework for Cybercrime Investigation in India Using Digital Image Forensics
    International Conference on Intelligent Computing and Applications
    Springer, 2018
    DOI: 10.1007/978-981-10-5520-1_16
    BibTeX
    @incollection{Thekkekoodathil2018,
     author = {Thekkekoodathil, Vijith T. K. and Vijayaragavan, Pramod K.},
     title = {A Model of Legal and Procedural Framework for Cybercrime Investigation in India Using Digital Image Forensics},
     booktitle = {International Conference on Intelligent Computing and Applications},
     publisher = {Springer},
     year = {2018}}
     
  252. M. Tiwari & B. Gupta
    Image features dependant correlation-weighting function for efficient PRNU based source camera identification
    Forensic Science International, Elsevier BV, 2018, Vol. 285, pp. 111-120
    DOI: 10.1016/j.forsciint.2018.02.005
    BibTeX
    @article{Tiwari2018,
     author = {Tiwari, Mayank and Gupta, Bhupendra},
     title = {Image features dependant correlation-weighting function for efficient PRNU based source camera identification},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {285},
     pages = {111--120}}
     
  253. M.-J. Tsai & I. Yuadi
    Digital forensics of microscopic images for printed source identification
    Multimedia Tools and Applications, Springer, 2018, Vol. 77(7), pp. 8729
    DOI: 10.1007/s11042-017-4771-1
    BibTeX
    @article{Tsai2018,
     author = {Tsai, Min-Jen and Yuadi, Imam},
     title = {Digital forensics of microscopic images for printed source identification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     volume = {77},
     number = {7},
     pages = {8729}}
     
  254. E. Turajlic
    Adaptive SVD Domain Based White Gaussian Noise Level Estimation in Images
    IEEE Access, 2018, pp. 1
    DOI: 10.1109/ACCESS.2018.2882298
    BibTeX
    @article{Turajlic2018,
     author = {Turajlic, E.},
     title = {Adaptive SVD Domain Based White Gaussian Noise Level Estimation in Images},
     journal = {IEEE Access},
     year = {2018},
     pages = {1}}
     
  255. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    ToothPic: camera-based image retrieval on large scales
    #IEEE_M_MM#, 2018, pp. 1
    DOI: 10.1109/MMUL.2018.2873845
    BibTeX
    @article{Valsesia2018,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {ToothPic: camera-based image retrieval on large scales},
     journal = {#IEEE_M_MM#},
     year = {2018},
     pages = {1}}
     
  256. A.A. Varlamova & A.V. Kuznetsov
    CFA Artifacts Analysis for Image Splicing Detection
    Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)
    Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018), 2018
    BibTeX
    @inproceedings{Varlamova2018,
     author = {Varlamova, A. A. and Kuznetsov, A. V.},
     title = {CFA Artifacts Analysis for Image Splicing Detection},
     booktitle = {Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)},
     journal = {Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)},
     year = {2018}}
     
  257. E.A. Vega, A.S. Orozco, L.G. Villalba & J. Hernandez-Castro
    Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns
    Sensors, MDPI AG, 2018, Vol. 18(10), pp. 3372
    DOI: 10.3390/s18103372
    BibTeX
    @article{Vega2018,
     author = {Vega, Esteban Armas and Orozco, Ana Sandoval and Villalba, Luis Garc\ia and Hernandez-Castro, Julio},
     title = {Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2018},
     volume = {18},
     number = {10},
     pages = {3372}}
     
  258. U.S. Venkata & R. Naskar
    Eliminating the effects of illumination condition in feature based camera model identification
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 52, pp. 24-32
    DOI: 10.1016/j.jvcir.2018.01.015
    BibTeX
    @article{Venkata2018,
     author = {Venkata, Udaya Sameer and Naskar, Ruchira},
     title = {Eliminating the effects of illumination condition in feature based camera model identification},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {52},
     pages = {24--32}}
     
  259. S. Verde, L. Bondi, P. Bestagini, S. Milani, G. Calvagno & S. Tubaro
    Video Codec Forensics Based on Convolutional Neural Networks
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 530-534
    DOI: 10.1109/ICIP.2018.8451143
    BibTeX
    @inproceedings{Verde2018,
     author = {Verde, S. and Bondi, L. and Bestagini, P. and Milani, S. and Calvagno, G. and Tubaro, S.},
     title = {Video Codec Forensics Based on Convolutional Neural Networks},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {530--534}}
     
  260. H.K. Verma, V. Verma & N. Khanna
    Mathematical Models for Digital Imaging and their Applications in Digital Image Forensics
    Ram, M. (ed.)
    Chapter 4
    Mathematics Applied in Information Systems, Bentham Science Publishers, 2018, Vol. 2, pp. 72-107
    DOI: 10.2174/97816810871391180201
    BibTeX
    @inbook{Verma2018,
     author = {Verma, Hemant K. and Verma, Vinay and Khanna, Nitin},
     title = {Mathematical Models for Digital Imaging and their Applications in Digital Image Forensics},
     journal = {Mathematics Applied in Information Systems},
     publisher = {Bentham Science Publishers},
     year = {2018},
     volume = {2},
     pages = {72--107}}
     
  261. D.S. Vidyadharan & S.M. Thampi
    Illuminant Color Inconsistency as a Powerful Clue for Detecting Digital Image Forgery: A Survey
    Intelligent Systems Technologies and Applications
    Springer, 2018
    DOI: 10.1007/978-3-319-68385-0_24
    BibTeX
    @incollection{Vidyadharan2018,
     author = {Vidyadharan, Divya S. and Thampi, Sabu M.},
     title = {Illuminant Color Inconsistency as a Powerful Clue for Detecting Digital Image Forgery: A Survey},
     booktitle = {Intelligent Systems Technologies and Applications},
     publisher = {Springer},
     year = {2018}}
     
  262. D.S. Vidyadharan & S.M. Thampi
    Evaluating color and texture features for forgery localization from illuminant maps
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-017-5574-0
    BibTeX
    @article{Vidyadharan2018a,
     author = {Vidyadharan, Divya S. and Thampi, Sabu M.},
     title = {Evaluating color and texture features for forgery localization from illuminant maps},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  263. M. Wahid, N. Ahmad, M.H. Zafar & S. Khan
    On combining MD5 for image authentication using LSB substitution in selected pixels
    2018 International Conference on Engineering and Emerging Technologies (ICEET)
    IEEE, 2018
    DOI: 10.1109/iceet1.2018.8338621
    BibTeX
    @inproceedings{Wahid2018,
     author = {Wahid, Muneeza and Ahmad, Nasir and Zafar, Muhammad Haseeb and Khan, Sahib},
     title = {On combining MD5 for image authentication using LSB substitution in selected pixels},
     booktitle = {2018 International Conference on Engineering and Emerging Technologies (ICEET)},
     publisher = {IEEE},
     year = {2018}}
     
  264. J. Waleed, D.A. Abdullah & M.H. Khudhur
    Comprehensive Display of Digital Image Copy-Move Forensics Techniques
    Proc. Int. Conf. Engineering Technology and their Applications (IICETA)
    2018, pp. 155-160
    DOI: 10.1109/IICETA.2018.8458084
    BibTeX
    @inproceedings{Waleed2018,
     author = {Waleed, J. and Abdullah, D. A. and Khudhur, M. H.},
     title = {Comprehensive Display of Digital Image Copy-Move Forensics Techniques},
     booktitle = {Proc. Int. Conf. Engineering Technology and their Applications (IICETA)},
     year = {2018},
     pages = {155--160}}
     
  265. S. Walia & K. Kumar
    An Eagle-Eye View of Recent Digital Image Forgery Detection Methods
    Smart and Innovative Trends in Next Generation Computing Technologies, Springer, 2018
    DOI: 10.1007/978-981-10-8660-1_36
    BibTeX
    @article{Walia2018,
     author = {Walia, Savita and Kumar, Krishan},
     title = {An Eagle-Eye View of Recent Digital Image Forgery Detection Methods},
     journal = {Smart and Innovative Trends in Next Generation Computing Technologies},
     publisher = {Springer},
     year = {2018}}
     
  266. B. Wang, J. Yin, S. Tan, Y. Li & M. Li
    Source camera model identification based on convolutional neural networks with local binary patterns coding
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 68, pp. 162-168
    DOI: 10.1016/j.image.2018.08.001
    BibTeX
    @article{Wang2018i,
     author = {Wang, Bo and Yin, Jianfeng and Tan, Shunquan and Li, Yabin and Li, Ming},
     title = {Source camera model identification based on convolutional neural networks with local binary patterns coding},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {68},
     pages = {162--168}}
     
  267. B. Wang, K. Zhong & M. Li
    Ensemble classifier based source camera identification using fusion features
    Multimedia Tools and Applications, Springer Nature America, Inc, 2018
    DOI: 10.1007/s11042-018-6835-2
    BibTeX
    @article{Wang2018h,
     author = {Wang, Bo and Zhong, Kun and Li, Ming},
     title = {Ensemble classifier based source camera identification using fusion features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature America, Inc},
     year = {2018}}
     
  268. C. Wang, Z. Zhang & X. Zhou
    An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features
    sysmmetry, 2018
    BibTeX
    @article{Wang2018g,
     author = {Wang, Chengyou and Zhang, Zhi and Zhou, Xiao},
     title = {An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features},
     journal = {sysmmetry},
     year = {2018}}
     
  269. D.-p. Wang, T. Gao & F. Yang
    A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5651-z
    BibTeX
    @article{Wang2018,
     author = {Wang, Dong-ping and Gao, Tiegang and Yang, Fusheng},
     title = {A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  270. P. Wang, F. Liu, C. Yang & X. Luo
    Blind forensics of image gamma transformation and its application in splicing detection
    Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 55, pp. 80-90
    DOI: 10.1016/j.jvcir.2018.05.020
    BibTeX
    @article{Wang2018d,
     author = {Wang, Ping and Liu, Fenlin and Yang, Chunfang and Luo, Xiangyang},
     title = {Blind forensics of image gamma transformation and its application in splicing detection},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {55},
     pages = {80--90}}
     
  271. X. Wang
    Photo-based vendor re-identification on darknet marketplaces using deep neural networks
    Virginia Polytechnic Institute and State University, Virginia Polytechnic Institute and State University, 2018
    BibTeX
    @mastersthesis{Wang2018b,
     author = {Wang, Xiangwen},
     title = {Photo-based vendor re-identification on darknet marketplaces using deep neural networks},
     school = {Virginia Polytechnic Institute and State University},
     year = {2018}}
     
  272. X. Wang, P. Peng, C. Wang & G. Wang
    You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
    Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS), 2018
    BibTeX
    @article{Wang2018a,
     author = {Wang, Xiangwen and Peng, Peng and Wang, Chun and Wang, Gang},
     title = {You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces},
     journal = {Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)},
     year = {2018}}
     
  273. X.-Y. Wang, L.-X. Jiao, X.-B. Wang, H.-Y. Yang & P.-P. Niu
    A new keypoint-based copy-move forgery detection for color image
    Applied Intelligence, Springer, 2018, pp. 1
    DOI: 10.1007/s10489-018-1168-4
    BibTeX
    @article{Wang2018c,
     author = {Wang, Xiang-Yang and Jiao, Li-Xian and Wang, Xue-Bing and Yang, Hong-Ying and Niu, Pan-Pan},
     title = {A new keypoint-based copy-move forgery detection for color image},
     journal = {Applied Intelligence},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  274. X.-y. Wang, L.-x. Jiao, X.-b. Wang, H.-y. Yang & P.-p. Niu
    Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6354-1
    BibTeX
    @article{Wang2018f,
     author = {Wang, Xiang-yang and Jiao, Li-xian and Wang, Xue-bing and Yang, Hong-ying and Niu, Pan-pan},
     title = {Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  275. Y. Wang & S.-i. Kamata
    Copy Move Image Forgery Detection Based on Polar Fourier Representation
    International Journal of Machine Learning and Computing, 2018, Vol. 8(2)
    BibTeX
    @article{Wang2018e,
     author = {Wang, Yitian and Kamata, Sei-ichiro},
     title = {Copy Move Image Forgery Detection Based on Polar Fourier Representation},
     journal = {International Journal of Machine Learning and Computing},
     year = {2018},
     volume = {8},
     number = {2}}
     
  276. A. Wary & A. Neelima
    A review on robust video copy detection
    International Journal of Multimedia Information Retrieval, Springer, 2018, pp. 1
    DOI: 10.1007/s13735-018-0159-x
    BibTeX
    @article{Wary2018,
     author = {Wary, Alongbar and Neelima, Arambam},
     title = {A review on robust video copy detection},
     journal = {International Journal of Multimedia Information Retrieval},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  277. J.-D. Wei, H.-J. Cheng & C.-W. Chang
    Hopfield network-based approach to detect seam-carved images and identify tampered regions
    Neural Computing and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s00521-018-3463-8
    BibTeX
    @article{Wei2018,
     author = {Wei, Jyh-Da and Cheng, Hui-Jun and Chang, Che-Wen},
     title = {Hopfield network-based approach to detect seam-carved images and identify tampered regions},
     journal = {Neural Computing and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  278. B. van Werkhoven, P. Hijma, C.J.H. Jacobs, J. Maassen, Z.J.M.H. Geradts & H.E. Bal
    A Jungle Computing approach to common image source identification in large collections of images
    Digital Investigation, Elsevier BV, 2018, Vol. 27, pp. 3-16
    DOI: 10.1016/j.diin.2018.09.002
    BibTeX
    @article{Werkhoven2018,
     author = {van Werkhoven, B. and Hijma, P. and Jacobs, C. J. H. and Maassen, J. and Geradts, Z. J. M. H. and Bal, H. E.},
     title = {A Jungle Computing approach to common image source identification in large collections of images},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {27},
     pages = {3--16}}
     
  279. M. Wu
    Research on optimization of image fast feature point matching algorithm
    EURASIP Journal on Image and Video Processing, Springer Nature America, Inc, 2018, Vol. 2018(1)
    DOI: 10.1186/s13640-018-0354-y
    BibTeX
    @article{Wu2018c,
     author = {Wu, Manyi},
     title = {Research on optimization of image fast feature point matching algorithm},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer Nature America, Inc},
     year = {2018},
     volume = {2018},
     number = {1}}
     
  280. X.-Q. Wu, H.-S. Li, J. Cao & Q. Cai
    Geometry of Motion for Video Shakiness Detection
    Journal of Computer Science and Technology, Springer, 2018, Vol. 33(3), pp. 475
    DOI: 10.1007/s11390-018-1832-5
    BibTeX
    @article{Wu2018,
     author = {Wu, Xiao-Qun and Li, Hai-Sheng and Cao, Jian and Cai, Qiang},
     title = {Geometry of Motion for Video Shakiness Detection},
     journal = {Journal of Computer Science and Technology},
     publisher = {Springer},
     year = {2018},
     volume = {33},
     number = {3},
     pages = {475}}
     
  281. Y. Wu, W. Abd-Almageed & P. Natarajan
    Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network
    Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
    2018, pp. 1907-1915
    DOI: 10.1109/WACV.2018.00211
    BibTeX
    @inproceedings{Wu2018a,
     author = {Wu, Y. and Abd-Almageed, W. and Natarajan, P.},
     title = {Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network},
     booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)},
     year = {2018},
     pages = {1907--1915}}
     
  282. Y. Wu, W. Abd-Almageed & P. Natarajan
    BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization
    Computer Vision – ECCV 2018, Springer, 2018
    DOI: 10.1007/978-3-030-01231-1_11
    BibTeX
    @article{Wu2018b,
     author = {Wu, Yue and Abd-Almageed, Wael and Natarajan, Prem},
     title = {BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization},
     journal = {Computer Vision – ECCV 2018},
     publisher = {Springer},
     year = {2018}}
     
  283. C. Xiong, J. Zhu, Y. Li & R. Xiang
    Image-based forgery detection using big data clustering
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-017-5555-3
    BibTeX
    @article{Xiong2018,
     author = {Xiong, Chao and Zhu, Ju and Li, Yuan and Xiang, Ruxi},
     title = {Image-based forgery detection using big data clustering},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  284. F. Xue, W. Lu, Z. Ye & H. Liu
    JPEG image tampering localization based on normalized gray level co-occurrence matrix
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6611-3
    BibTeX
    @article{Xue2018,
     author = {Xue, Fei and Lu, Wei and Ye, Ziyi and Liu, Hongmei},
     title = {JPEG image tampering localization based on normalized gray level co-occurrence matrix},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  285. Y. Yan, W. Ren & X. Cao
    Recolored Image Detection via a Deep Discriminative Model
    IEEE Transactions on Information Forensics and Security, 2018, pp. 1
    DOI: 10.1109/TIFS.2018.2834155
    BibTeX
    @article{Yan2018,
     author = {Yan, Y. and Ren, W. and Cao, X.},
     title = {Recolored Image Detection via a Deep Discriminative Model},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2018},
     pages = {1}}
     
  286. F. Yang, Y. Li, K. Chong & B. Wang
    Double JPEG Compression Detection Based on Fusion Features
    Machine Learning and Intelligent Communications, Springer, 2018
    DOI: 10.1007/978-3-319-73564-1_16
    BibTeX
    @article{Yang2018,
     author = {Yang, Fulong and Li, Yabin and Chong, Kun and Wang, Bo},
     title = {Double JPEG Compression Detection Based on Fusion Features},
     journal = {Machine Learning and Intelligent Communications},
     publisher = {Springer},
     year = {2018}}
     
  287. P. Yang, R. Ni & Y. Zhao
    Double JPEG compression detection by exploring the correlations in DCT domain
    ArXiv, 2018
    arXiv: http://arxiv.org/abs/1806.01571v1
    BibTeX
    @article{Yang2018a,
     author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao},
     title = {Double JPEG compression detection by exploring the correlations in DCT domain},
     journal = {ArXiv},
     year = {2018}}
     
  288. P. Yang, R. Ni, Y. Zhao, G. Cao, H. Wu & W. Zhao
    Robust Contrast Enhancement Forensics Using Convolutional Neural Networks
    ArXiv, 2018
    arXiv: http://arxiv.org/abs/1803.04749v2
    BibTeX
    @article{Yang2018b,
     author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Cao, Gang and Wu, Haorui and Zhao, Wei},
     title = {Robust Contrast Enhancement Forensics Using Convolutional Neural Networks},
     journal = {ArXiv},
     year = {2018}}
     
  289. H. Yao, T. Qiao, M. Xu & N. Zheng
    Robust multi-classifier for camera model identification based on convolution neural network
    IEEE Access, 2018, Vol. 6, pp. 24973-24982
    DOI: 10.1109/ACCESS.2018.2832066
    BibTeX
    @article{Yao2018,
     author = {Yao, H. and Qiao, T. and Xu, M. and Zheng, N.},
     title = {Robust multi-classifier for camera model identification based on convolution neural network},
     journal = {IEEE Access},
     year = {2018},
     volume = {6},
     pages = {24973--24982}}
     
  290. W. Yaqub, M. Mohanty & N. Memon
    Towards Camera Identification from Cropped Query Images
    Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
    2018, pp. 3798-3802
    DOI: 10.1109/ICIP.2018.8451749
    BibTeX
    @inproceedings{Yaqub2018,
     author = {Yaqub, W. and Mohanty, M. and Memon, N.},
     title = {Towards Camera Identification from Cropped Query Images},
     booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)},
     year = {2018},
     pages = {3798--3802}}
     
  291. S.K. Yarlagadda, D. Güera, P. Bestagini, F.M. Zhu, S. Tubaro & E.J. Delp
    Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier
    ArXiv, 2018
    arXiv: 1802.04881v1
    BibTeX
    @article{Yarlagadda2018,
     author = {Yarlagadda, Sri Kalyan and Güera, David and Bestagini, Paolo and Zhu, Fengqing Maggie and Tubaro, Stefano and Delp, Edward J.},
     title = {Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier},
     journal = {ArXiv},
     year = {2018}}
     
  292. A. Ye, I. Mt & M. Shehata
    Fusion Approaches System of Copy-Move Forgery Detection
    American Journal of Computer Science and Engineering Survey, 2018
    BibTeX
    @article{Ye2018,
     author = {Ye, Abdalla and Mt, Iqbal and Shehata, M.},
     title = {Fusion Approaches System of Copy-Move Forgery Detection},
     journal = {American Journal of Computer Science and Engineering Survey},
     year = {2018}}
     
  293. Y.Y. Yeap, U.U. Sheikh & A.A.A. Rahman
    Image forensic for digital image copy move forgery detection
    Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)
    2018, pp. 239-244
    DOI: 10.1109/CSPA.2018.8368719
    BibTeX
    @inproceedings{Yeap2018a,
     author = {Yeap, Y. Y. and Sheikh, U. U. and Rahman, A. A. A.},
     title = {Image forensic for digital image copy move forgery detection},
     booktitle = {Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)},
     year = {2018},
     pages = {239--244}}
     
  294. Y.Y. Yeap, U.U. Sheikh & A.A.H.A. Rahman
    Image forensic for digital image copy move forgery detection
    Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)
    2018, pp. 239-244
    DOI: 10.1109/CSPA.2018.8368719
    BibTeX
    @inproceedings{Yeap2018,
     author = {Yeap, Y. Y. and Sheikh, U. U. and Rahman, A. A. H. A.},
     title = {Image forensic for digital image copy move forgery detection},
     booktitle = {Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)},
     year = {2018},
     pages = {239--244}}
     
  295. E.O. Yildirim & G. Ulutaş
    Image splicing detection with dwt domain extended Markov features
    Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
    2018, pp. 1-4
    DOI: 10.1109/SIU.2018.8404325
    BibTeX
    @inproceedings{Yildirim2018,
     author = {Yildirim, E. O. and Ulutaş, G.},
     title = {Image splicing detection with dwt domain extended Markov features},
     booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2018},
     pages = {1--4}}
     
  296. S. Yuting, G. Jing, D. Ling & K. Yongzhen
    Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation
    International Journal of Digital Crime and Forensics, IGI Global, 2018, Vol. 10(3), pp. 1-14
    DOI: 10.4018/ijdcf.2018070101
    BibTeX
    @article{Yuting2018,
     author = {Yuting, Sun and Jing, Guo and Ling, Du and Yongzhen, Ke},
     title = {Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation},
     journal = {International Journal of Digital Crime and Forensics},
     publisher = {IGI Global},
     year = {2018},
     volume = {10},
     number = {3},
     pages = {1--14}}
     
  297. X. Zeng, G. Feng & X. Zhang
    Detection of double JPEG compression using modified DenseNet model
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6737-3
    BibTeX
    @article{Zeng2018,
     author = {Zeng, Ximei and Feng, Guorui and Zhang, Xinpeng},
     title = {Detection of double JPEG compression using modified DenseNet model},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  298. D. Zhang, G. Yang, F. Li, J. Wang & A.K. Sangaiah
    Detecting seam carved images using uniform local binary patterns
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6470-y
    BibTeX
    @article{Zhang2018g,
     author = {Zhang, Dengyong and Yang, Gaobo and Li, Feng and Wang, Jin and Sangaiah, Arun Kumar},
     title = {Detecting seam carved images using uniform local binary patterns},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  299. J. Zhang, S. Niu, Y. Li & Y. Liu
    An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization
    Advances in Intelligent Information Hiding and Multimedia Signal Processing
    Springer, 2018
    DOI: 10.1007/978-3-319-63859-1_2
    BibTeX
    @incollection{Zhang2018,
     author = {Zhang, Jiwei and Niu, Shaozhang and Li, Yueying and Liu, Yuhan},
     title = {An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization},
     booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing},
     publisher = {Springer},
     year = {2018}}
     
  300. J. Zhang, Q. Ruan, Y. Jin & J. Ge
    Image Deeper Passive Forgery Detection Based on SIFT and Higher-Order Statistics Features
    Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)
    2018, pp. 1-6
    DOI: 10.1109/BigMM.2018.8499459
    BibTeX
    @inproceedings{Zhang2018e,
     author = {Zhang, J. and Ruan, Q. and Jin, Y. and Ge, J.},
     title = {Image Deeper Passive Forgery Detection Based on SIFT and Higher-Order Statistics Features},
     booktitle = {Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)},
     year = {2018},
     pages = {1--6}}
     
  301. L. Zhang, F. Peng & M. Long
    Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise
    Proc. IEEE Int. Conf. Multimedia and Expo (ICME)
    2018, pp. 1-6
    DOI: 10.1109/ICME.2018.8486607
    BibTeX
    @inproceedings{Zhang2018f,
     author = {Zhang, L. and Peng, F. and Long, M.},
     title = {Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise},
     booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo (ICME)},
     year = {2018},
     pages = {1--6}}
     
  302. Q. Zhang, W. Lu, R. Wang & G. Li
    Digital image splicing detection based on Markov features in block DWT domain
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6230-z
    BibTeX
    @article{Zhang2018c,
     author = {Zhang, Qingbo and Lu, Wei and Wang, Ruxin and Li, Guoqiang},
     title = {Digital image splicing detection based on Markov features in block DWT domain},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  303. X. Zhang, X. Liu, H. Shu & C. Yang
    Medical image blind integrity verification with Krawtchouk moments
    International Journal of Biomedical Imaging, 2018
    BibTeX
    @article{Zhang2018d,
     author = {Zhang, Xu and Liu, Xilin and Shu, Huazhong and Yang, Chen},
     title = {Medical image blind integrity verification with Krawtchouk moments},
     journal = {International Journal of Biomedical Imaging},
     year = {2018}}
     
  304. Y. Zhang & V.L.L. Thing
    A semi-feature learning approach for tampered region localization across multi-format images
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-5756-4
    BibTeX
    @article{Zhang2018b,
     author = {Zhang, Ying and Thing, Vrizlynn L. L.},
     title = {A semi-feature learning approach for tampered region localization across multi-format images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  305. Z. Zhang, Y. Zhang, Z. Zhou & J. Luo
    Boundary-based Image Forgery Detection by Fast Shallow CNN
    ArXiv, 2018
    arXiv: 1801.06732v1
    BibTeX
    @article{Zhang2018a,
     author = {Zhang, Zhongping and Zhang, Yixuan and Zhou, Zheng and Luo, Jiebo},
     title = {Boundary-based Image Forgery Detection by Fast Shallow CNN},
     journal = {ArXiv},
     year = {2018}}
     
  306. Y. Zhao, N. Zheng, T. Qiao & M. Xu
    Source camera identification via low dimensional PRNU features
    Multimedia Tools and Applications, Springer, 2018, pp. 1
    DOI: 10.1007/s11042-018-6809-4
    BibTeX
    @article{Zhao2018a,
     author = {Zhao, Yihua and Zheng, Ning and Qiao, Tong and Xu, Ming},
     title = {Source camera identification via low dimensional PRNU features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2018},
     pages = {1}}
     
  307. Y. Zheng, H. Sheng, Y. Liu, K. Lv, W. Ke & Z. Xiong
    Learning Irregular Space Transformation for Person Re-Identification
    #IEEE_O_ACC#, 2018, Vol. 6, pp. 53214-53225
    DOI: 10.1109/ACCESS.2018.2871149
    BibTeX
    @article{Zheng2018,
     author = {Zheng, Y. and Sheng, H. and Liu, Y. and Lv, K. and Ke, W. and Xiong, Z.},
     title = {Learning Irregular Space Transformation for Person Re-Identification},
     journal = {#IEEE_O_ACC#},
     year = {2018},
     volume = {6},
     pages = {53214--53225}}
     
  308. P. Zhou, X. Han, V.I. Morariu & L.S. Davis
    Learning Rich Features for Image Manipulation Detection
    ArXiv, 2018
    arXiv: 1805.04953v1
    BibTeX
    @article{Zhou2018a,
     author = {Zhou, Peng and Han, Xintong and Morariu, Vlad I. and Davis, Larry S.},
     title = {Learning Rich Features for Image Manipulation Detection},
     journal = {ArXiv},
     year = {2018}}
     
  309. R. Zhou, R. Achanta & S. Süsstrunk
    Deep Residual Network for Joint Demosaicing and Super-Resolution
    ArXiv, 2018
    arXiv: 1802.06573v1
    BibTeX
    @article{Zhou2018,
     author = {Zhou, Ruofan and Achanta, Radhakrishna and Süsstrunk, Sabine},
     title = {Deep Residual Network for Joint Demosaicing and Super-Resolution},
     journal = {ArXiv},
     year = {2018}}
     
  310. N. Zhu & Z. Li
    Blind image splicing detection via noise level function
    Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 68, pp. 181-192
    DOI: 10.1016/j.image.2018.07.012
    BibTeX
    @article{Zhu2018,
     author = {Zhu, Nan and Li, Zhao},
     title = {Blind image splicing detection via noise level function},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2018},
     volume = {68},
     pages = {181--192}}
     


2017

  1. I. Aamo & S.F. Caleb
    On the Use of Benford's Law to Detect JPEG Biometric Data Tampering
    Journal of Information Security, Scientific Research Publishing, Inc,, 2017, Vol. 08(03), pp. 240-256
    DOI: 10.4236/jis.2017.83016
    BibTeX
    @article{Aamo2017,
     author = {Aamo, Iorliam and Caleb, Shangbum F.},
     title = {On the Use of Benford's Law to Detect JPEG Biometric Data Tampering},
     journal = {Journal of Information Security},
     publisher = {Scientific Research Publishing, Inc,},
     year = {2017},
     volume = {08},
     number = {03},
     pages = {240--256}}
    
  2. J. Abdessamad, A. ElAdel & M. Zaied
    A sparse representation-based approach for copy-move image forgery detection in smooth regions
    Verikas, A., Radeva, P., Nikolaev, D. P., Zhang, W. & Zhou, J. (ed.)
    Ninth International Conference on Machine Vision (ICMV 2016)
    SPIE-Intl Soc Optical Eng, 2017
    DOI: 10.1117/12.2268766
    BibTeX
    @inproceedings{Abdessamad2017,
     author = {Abdessamad, Jalila and ElAdel, Asma and Zaied, Mourad},
     title = {A sparse representation-based approach for copy-move image forgery detection in smooth regions},
     booktitle = {Ninth International Conference on Machine Vision (ICMV 2016)},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2017}}
    
  3. S. Agarwal & H. Farid
    Photo forensics from JPEG dimples
    Proc. IEEE Workshop Information Forensics and Security (WIFS)
    2017, pp. 1-6
    DOI: 10.1109/WIFS.2017.8267641
    BibTeX
    @inproceedings{Agarwal2017,
     author = {Agarwal, S. and Farid, H.},
     title = {Photo forensics from JPEG dimples},
     booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)},
     year = {2017},
     pages = {1--6}}
    
  4. J. Alakuijala, R. Obryk, O. Stoliarchuk, Z. Szabadka, L. Vandevenne & J. Wassenberg
    Guetzli: Perceptually Guided JPEG Encoder
    arXiv, 2017
    BibTeX
    @article{Alakuijala2017,
     author = {Alakuijala, Jyrki and Obryk, Robert and Stoliarchuk, Ostap and Szabadka, Zoltan and Vandevenne, Lode and Wassenberg, Jan},
     title = {Guetzli: Perceptually Guided JPEG Encoder},
     journal = {arXiv},
     year = {2017}}
    
  5. Z. Al-Ameen & C. Al-Atroshi
    Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: A Laconic Review
    TechArt: Journal of Arts and Imaging Science, 2017, Vol. 4(1)
    DOI: 10.15323/techart.2017.2.4.1.32
    BibTeX
    @article{Al-Ameen2017,
     author = {Al-Ameen, Zohair and Al-Atroshi, Chiai},
     title = {Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: A Laconic Review},
     journal = {TechArt: Journal of Arts and Imaging Science},
     year = {2017},
     volume = {4},
     number = {1}}
    
  6. L. Alamro & N. Yusoffthe
    Copy-Move Forgery Detection using Integrated DWT and SURF
    Journal of Telecommunication, Electronic and Computer Engineering, 2017, Vol. 9(1-2)
    BibTeX
    @article{Alamro2017,
     author = {Alamro, Loai and Yusoffthe, Nooraini},
     title = {Copy-Move Forgery Detection using Integrated DWT and SURF},
     journal = {Journal of Telecommunication, Electronic and Computer Engineering},
     year = {2017},
     volume = {9},
     number = {1-2}}
    
  7. M. Al-Ani & F. Khelifi
    On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(5), pp. 1067-1081
    DOI: 10.1109/TIFS.2016.2640938
    BibTeX
    @article{Al-Ani2017,
     author = {Al-Ani, M. and Khelifi, F.},
     title = {On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {5},
     pages = {1067--1081}}
    
  8. N. Alherbawi, Z. Shukur & R. Sulaiman
    Current techniques in JPEG image authentication and forgery detection
    Journal of Engineering and Applied Sciences, Medwell Journals, 2017, Vol. 12(1), pp. 104-112
    DOI: 10.3923/jeasci.2017.104.112
    BibTeX
    @article{Alherbawi2017,
     author = {Alherbawi, Nadeem and Shukur, Zarina and Sulaiman, Rossilawati},
     title = {Current techniques in JPEG image authentication and forgery detection},
     journal = {Journal of Engineering and Applied Sciences},
     publisher = {Medwell Journals},
     year = {2017},
     volume = {12},
     number = {1},
     pages = {104--112}}
    
  9. N. Alherbawi, Z. Shukur & R. Sulaiman
    JPEG image classification in digital forensic via DCT coefficient analysis
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4915-3
    BibTeX
    @article{Alherbawi2017a,
     author = {Alherbawi, Nadeem and Shukur, Zarina and Sulaiman, Rossilawati},
     title = {JPEG image classification in digital forensic via DCT coefficient analysis},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  10. L. Ali, T. Kasetkasem, F.G. Khan, T. Chanwimaluang & H. Nakahara
    Identification of inpainted satellite images using evalutionary artificial neural network (EANN) and k-nearest neighbor(KNN) algorithm
    Proc. 8th Int. Conf. of Information and Communication Technology for Embedded Systems (IC-ICTES)
    2017, pp. 1-6
    DOI: 10.1109/ICTEmSys.2017.7958765
    BibTeX
    @inproceedings{Ali2017,
     author = {Ali, L. and Kasetkasem, T. and Khan, F. G. and Chanwimaluang, T. and Nakahara, H.},
     title = {Identification of inpainted satellite images using evalutionary artificial neural network (EANN) and k-nearest neighbor(KNN) algorithm},
     booktitle = {Proc. 8th Int. Conf. of Information and Communication Technology for Embedded Systems (IC-ICTES)},
     year = {2017},
     pages = {1--6}}
    
  11. G. Alikhajeh, A. Mirzaei, M. Safayani & M. Ghaffari
    Duplicate matching and estimating features for detection of copy-move images forgery
    arXiv, 2017
    BibTeX
    @article{Alikhajeh2017,
     author = {Alikhajeh, Ghassem and Mirzaei, Abdolreza and Safayani, Mehran and Ghaffari, Meysam},
     title = {Duplicate matching and estimating features for detection of copy-move images forgery},
     journal = {arXiv},
     year = {2017}}
    
  12. O.M. Al-Qershi & B.E. Khoo
    Comparison of Matching Methods for Copy-move Image Forgery Detection
    9th International Conference on Robotic, Vision, Signal Processing and Power Applications
    Springer, 2017
    DOI: 10.1007/978-981-10-1721-6_23
    BibTeX
    @incollection{Al-Qershi2017,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Comparison of Matching Methods for Copy-move Image Forgery Detection},
     booktitle = {9th International Conference on Robotic, Vision, Signal Processing and Power Applications},
     publisher = {Springer},
     year = {2017}}
    
  13. S. AlZahir & R. Hammad
    Blind copula based copy-move forgery detection algorithm
    Proc. IEEE Int. Conf. Consumer Electronics (ICCE)
    2017, pp. 436-437
    DOI: 10.1109/ICCE.2017.7889387
    BibTeX
    @inproceedings{AlZahir2017,
     author = {AlZahir, S. and Hammad, R.},
     title = {Blind copula based copy-move forgery detection algorithm},
     booktitle = {Proc. IEEE Int. Conf. Consumer Electronics (ICCE)},
     year = {2017},
     pages = {436--437}}
    
  14. I. Amerini, R. Caldelli, A.D. Mastio, A.D. Fuccia, C. Molinari & A.P. Rizzo
    Dealing with video source identification in social networks
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 57, pp. 1-7
    DOI: 10.1016/j.image.2017.04.009
    BibTeX
    @article{Amerini2017,
     author = {Amerini, Irene and Caldelli, Roberto and Mastio, Andrea Del and Fuccia, Andrea Di and Molinari, Cristiano and Rizzo, Anna Paola},
     title = {Dealing with video source identification in social networks},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     pages = {1--7}}
    
  15. I. Amerini, T. Uricchio, L. Ballan & R. Caldelli
    Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1865-1871
    DOI: 10.1109/CVPRW.2017.233
    BibTeX
    @inproceedings{Amerini2017a,
     author = {Amerini, I. and Uricchio, T. and Ballan, L. and Caldelli, R.},
     title = {Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1865--1871}}
    
  16. I. Amerini, T. Uricchio, L. Ballan & R. Caldelli
    Localization of JPEG double compression through multi-domain convolutional neural networks
    ArXiv, 2017
    BibTeX
    @article{Amerini2017b,
     author = {Amerini, Irene and Uricchio, Tiberio and Ballan, Lamberto and Caldelli, Roberto},
     title = {Localization of JPEG double compression through multi-domain convolutional neural networks},
     journal = {ArXiv},
     year = {2017}}
    
  17. I. Amerini, T. Uricchio & R. Caldelli
    Tracing images back to their social network of origin: A CNN-based approach
    Proc. IEEE Workshop Information Forensics and Security (WIFS)
    2017, pp. 1-6
    DOI: 10.1109/WIFS.2017.8267660
    BibTeX
    @inproceedings{Amerini2017c,
     author = {Amerini, I. and Uricchio, T. and Caldelli, R.},
     title = {Tracing images back to their social network of origin: A CNN-based approach},
     booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)},
     year = {2017},
     pages = {1--6}}
    
  18. U. Arya, G. Singh, R. Singhal, S. Kumar & H. Usmaan
    Image authentication based on salient regions of image
    Proc. Int. Electrical Engineering Congress (iEECON)
    2017, pp. 1-4
    DOI: 10.1109/IEECON.2017.8075882
    BibTeX
    @inproceedings{Arya2017,
     author = {Arya, U. and Singh, G. and Singhal, R. and Kumar, S. and Usmaan, H.},
     title = {Image authentication based on salient regions of image},
     booktitle = {Proc. Int. Electrical Engineering Congress (iEECON)},
     year = {2017},
     pages = {1--4}}
    
  19. A.S. Ashour & N. Dey
    Security of Multimedia Contents: A Brief
    Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
    DOI: 10.1007/978-3-319-44790-2_1
    BibTeX
    @article{Ashour2017,
     author = {Ashour, Amira S. and Dey, Nilanjan},
     title = {Security of Multimedia Contents: A Brief},
     journal = {Intelligent Techniques in Signal Processing for Multimedia Security},
     publisher = {Springer},
     year = {2017}}
    
  20. R.S. Ayyalasomayajula & V. Pankajakshan
    Differentiating Photographic and PRCG Images Using Tampering Localization Features
    Proceedings of International Conference on Computer Vision and Image Processing
    Springer, 2017
    DOI: 10.1007/978-981-10-2107-7_39
    BibTeX
    @incollection{Ayyalasomayajula2017,
     author = {Ayyalasomayajula, Roshan Sai and Pankajakshan, Vinod},
     title = {Differentiating Photographic and PRCG Images Using Tampering Localization Features},
     booktitle = {Proceedings of International Conference on Computer Vision and Image Processing},
     publisher = {Springer},
     year = {2017}}
    
  21. S. Banerjee & A. Ross
    From image to sensor: Comparative evaluation of multiple PRNU estimation schemes for identifying sensors from NIR iris images
    Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)
    2017, pp. 1-6
    DOI: 10.1109/IWBF.2017.7935081
    BibTeX
    @inproceedings{Banerjee2017,
     author = {Banerjee, S. and Ross, A.},
     title = {From image to sensor: Comparative evaluation of multiple PRNU estimation schemes for identifying sensors from NIR iris images},
     booktitle = {Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2017},
     pages = {1--6}}
    
  22. J.H. Bappy, A.K. Roy-Chowdhury, J. Bunk, L. Nataraj & B.S. Manjunath
    Exploiting Spatial Structure for Localizing Manipulated Image Regions
    Proc. of the ICCV 2017
    2017
    BibTeX
    @conference{Bappy2017,
     author = {Bappy, Jawadul H. and Roy-Chowdhury, Amit K. and Bunk, Jason and Nataraj, Lakshmanan and Manjunath, B. S.},
     title = {Exploiting Spatial Structure for Localizing Manipulated Image Regions},
     booktitle = {Proc. of the ICCV 2017},
     year = {2017}}
    
  23. M. Barni, L. Bondi, N. Bonettini, P. Bestagini, A. Costanzo, M. Maggini, B. Tondi & S. Tubaro
    Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks
    arXiv, 2017
    BibTeX
    @article{Barni2017a,
     author = {Barni, Mauro and Bondi, Luca and Bonettini, Nicolò and Bestagini, Paolo and Costanzo, Andrea and Maggini, Marco and Tondi, Benedetta and Tubaro, Stefano},
     title = {Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks},
     journal = {arXiv},
     year = {2017}}
    
  24. M. Barni, E. Nowroozi & B. Tondi
    Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples.
    Proc. of the 25th European Signal Processing Conference (EUSIPCO), 2017
    BibTeX
    @article{Barni2017,
     author = {Barni, Mauro and Nowroozi, Ehsan and Tondi, Benedetta},
     title = {Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples.},
     journal = {Proc. of the 25th European Signal Processing Conference (EUSIPCO)},
     year = {2017}}
    
  25. B. Bayar & M.C. Stamm
    On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection
    Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics
    2017, pp. 2152-2156
    DOI: 10.1109/ICASSP.2017.7952537
    BibTeX
    @inproceedings{Bayar2017,
     author = {Bayar, B. and Stamm, M. C.},
     title = {On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics},
     year = {2017},
     pages = {2152--2156}}
    
  26. B. Bayar & M.C. Stamm
    A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks
    Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17
    ACM Press, 2017
    DOI: 10.1145/3082031.3083249
    BibTeX
    @inproceedings{Bayar2017a,
     author = {Bayar, Belhassen and Stamm, Matthew C.},
     title = {A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks},
     booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17},
     publisher = {ACM Press},
     year = {2017}}
    
  27. P. Bhavya Bhanu M & N. Arun Kumar M
    Copy-move forgery detection using segmentation
    Proc. 11th Int. Conf. Intelligent Systems and Control (ISCO)
    2017, pp. 224-228
    DOI: 10.1109/ISCO.2017.7855986
    BibTeX
    @inproceedings{BhavyaBhanuM2017,
     author = {Bhavya Bhanu M, P. and Arun Kumar M, N.},
     title = {Copy-move forgery detection using segmentation},
     booktitle = {Proc. 11th Int. Conf. Intelligent Systems and Control (ISCO)},
     year = {2017},
     pages = {224--228}}
    
  28. X. Bi & C.-M. Pun
    Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection
    Information Sciences, Elsevier BV, 2017
    DOI: 10.1016/j.ins.2017.08.044
    BibTeX
    @article{Bi2017,
     author = {Bi, Xiuli and Pun, Chi-Man},
     title = {Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection},
     journal = {Information Sciences},
     publisher = {Elsevier BV},
     year = {2017}}
    
  29. A. Biedermann, S. Bozza, F. Taroni & C. Aitken
    The consequences of understanding expert probability reporting as a decision
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 80-85
    DOI: 10.1016/j.scijus.2016.10.005
    BibTeX
    @article{Biedermann2017,
     author = {Biedermann, A. and Bozza, S. and Taroni, F. and Aitken, C.},
     title = {The consequences of understanding expert probability reporting as a decision},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {80--85}}
    
  30. G.K. Birajdar & V.H. Mankar
    Blind image forensics using reciprocal singular value curve based local statistical features
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5021-2
    BibTeX
    @article{Birajdar2017,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Blind image forensics using reciprocal singular value curve based local statistical features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  31. G.K. Birajdar & V.H. Mankar
    Subsampling-Based Blind Image Forgery Detection Using Support Vector Machine and Artificial Neural Network Classifiers
    Arabian Journal for Science and Engineering, Springer, 2017, pp. 1
    DOI: 10.1007/s13369-017-2671-3
    BibTeX
    @article{Birajdar2017b,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Subsampling-Based Blind Image Forgery Detection Using Support Vector Machine and Artificial Neural Network Classifiers},
     journal = {Arabian Journal for Science and Engineering},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  32. C. Boididou, S.E. Middleton, Z. Jin, S. Papadopoulos, D.-T. Dang-Nguyen, G. Boato & Y. Kompatsiaris
    Verifying information with multimedia content on twitter
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5132-9
    BibTeX
    @article{Boididou2017,
     author = {Boididou, Christina and Middleton, Stuart E. and Jin, Zhiwei and Papadopoulos, Symeon and Dang-Nguyen, Duc-Tien and Boato, Giulia and Kompatsiaris, Yiannis},
     title = {Verifying information with multimedia content on twitter},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  33. C. Boididou, S. Papadopoulos, M. Zampoglou, L. Apostolidis, O. Papadopoulou & Y. Kompatsiaris
    Detection and visualization of misleading content on Twitter
    International Journal of Multimedia Information Retrieval, Springer, 2017, pp. 1
    DOI: 10.1007/s13735-017-0143-x
    BibTeX
    @article{Boididou2017a,
     author = {Boididou, Christina and Papadopoulos, Symeon and Zampoglou, Markos and Apostolidis, Lazaros and Papadopoulou, Olga and Kompatsiaris, Yiannis},
     title = {Detection and visualization of misleading content on Twitter},
     journal = {International Journal of Multimedia Information Retrieval},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  34. L. Bondi, L. Baroffio, D. Güera, P. Bestagini, E.J. Delp & S. Tubaro
    First Steps Toward Camera Model Identification With Convolutional Neural Networks
    IEEE Signal Processing Letters, 2017, Vol. 24(3), pp. 259-263
    DOI: 10.1109/LSP.2016.2641006
    BibTeX
    @article{Bondi2017b,
     author = {Bondi, L. and Baroffio, L. and Güera, D. and Bestagini, P. and Delp, E. J. and Tubaro, S.},
     title = {First Steps Toward Camera Model Identification With Convolutional Neural Networks},
     journal = {IEEE Signal Processing Letters},
     year = {2017},
     volume = {24},
     number = {3},
     pages = {259--263}}
    
  35. L. Bondi, S. Lameri, D. Güera, P. Bestagini, E.J. Delp & S. Tubaro
    Tampering Detection and Localization Through Clustering of Camera-Based CNN Features
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1855-1864
    DOI: 10.1109/CVPRW.2017.232
    BibTeX
    @inproceedings{Bondi2017,
     author = {Bondi, L. and Lameri, S. and Güera, D. and Bestagini, P. and Delp, E. J. and Tubaro, S.},
     title = {Tampering Detection and Localization Through Clustering of Camera-Based CNN Features},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1855--1864}}
    
  36. N. Bonettini
    JPEG-based Forensics through Convolutional Neural Networks
    Politecnico Di Milano, Politecnico Di Milano, 2017
    BibTeX
    @mastersthesis{Bonettini2017,
     author = {Bonettini, Nicol`o},
     title = {JPEG-based Forensics through Convolutional Neural Networks},
     school = {Politecnico Di Milano},
     year = {2017}}
    
  37. J. Brogan, P. Bestagini, A. Bharati, A. Pinto, D. Moreira, K. Bowyer, P. Flynn, A. Rocha & W. Scheirer
    Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization
    arxiv, 2017
    BibTeX
    @article{Brogan2017,
     author = {Brogan, Joel and Bestagini, Paolo and Bharati, Aparna and Pinto, Allan and Moreira, Daniel and Bowyer, Kevin and Flynn, Patrick and Rocha, Anderson and Scheirer, Walter},
     title = {Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization},
     journal = {arxiv},
     year = {2017}}
    
  38. M. Brouwers & R. Mousa
    Automatic comparison of photo response non uniformity (PRNU) on Youtube
    System and Network Engineering • January 2017, 2017
    BibTeX
    @article{Brouwers2017,
     author = {Brouwers, Marcel and Mousa, Rahaf},
     title = {Automatic comparison of photo response non uniformity (PRNU) on Youtube},
     journal = {System and Network Engineering • January 2017},
     year = {2017}}
    
  39. J. Bunk, J.H. Bappy, T.M. Mohammed, L. Nataraj, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury & L. Peterson
    Detection and Localization of Image Forgeries using Resampling Features and Deep Learning
    arXiv, 2017
    BibTeX
    @article{Bunk2017,
     author = {Bunk, Jason and Bappy, Jawadul H. and Mohammed, Tajuddin Manhar and Nataraj, Lakshmanan and Flenner, Arjuna and Manjunath, B. S. and Chandrasekaran, Shivkumar and Roy-Chowdhury, Amit K. and Peterson, Lawrence},
     title = {Detection and Localization of Image Forgeries using Resampling Features and Deep Learning},
     journal = {arXiv},
     year = {2017}}
    
  40. J. Bunk, J.H. Bappy, T.M. Mohammed, L. Nataraj, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury & L. Peterson
    Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1881-1889
    DOI: 10.1109/CVPRW.2017.235
    BibTeX
    @inproceedings{Bunk2017a,
     author = {Bunk, J. and Bappy, J. H. and Mohammed, T. M. and Nataraj, L. and Flenner, A. and Manjunath, B. S. and Chandrasekaran, S. and Roy-Chowdhury, A. K. and Peterson, L.},
     title = {Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1881--1889}}
    
  41. R. Caldelli, R. Becarelli & I. Amerini
    Image Origin Classification based on Social Network Provenance
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656842
    BibTeX
    @article{Caldelli2017,
     author = {Caldelli, R. and Becarelli, R. and Amerini, I.},
     title = {Image Origin Classification based on Social Network Provenance},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  42. G. Cattaneo, U. Ferraro Petrillo, M. Nappi, F. Narducci & G. Roscigno
    An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop
    Green, Pervasive, and Cloud Computing, Springer, 2017
    DOI: 10.1007/978-3-319-57186-7_35
    BibTeX
    @article{Cattaneo2017a,
     author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Nappi, Michele and Narducci, Fabio and Roscigno, Gianluca},
     title = {An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop},
     journal = {Green, Pervasive, and Cloud Computing},
     publisher = {Springer},
     year = {2017}}
    
  43. G. Cattaneo, G. Roscigno & U.F. Petrillo
    Improving the experimental analysis of tampered image detection algorithms for biometric systems
    Pattern Recognition Letters, Elsevier BV, 2017
    DOI: 10.1016/j.patrec.2017.01.006
    BibTeX
    @article{Cattaneo2017,
     author = {Cattaneo, Giuseppe and Roscigno, Gianluca and Petrillo, Umberto Ferraro},
     title = {Improving the experimental analysis of tampered image detection algorithms for biometric systems},
     journal = {Pattern Recognition Letters},
     publisher = {Elsevier BV},
     year = {2017}}
    
  44. S. Chakraborty & M. Kirchner
    PRNU-based Image Manipulation Localization with Discriminative Random Fields
    2017
    BibTeX
    @unpublished{Chakraborty2017,
     author = {Chakraborty, S. and Kirchner, M.},
     title = {PRNU-based Image Manipulation Localization with Discriminative Random Fields},
     year = {2017}}
    
  45. P.S. Chandakkar & B. Li
    Capturing Localized Image Artifacts through a CNN-based Hyper-image Representation
    ArXiv, 2017
    BibTeX
    @article{Chandakkar2017,
     author = {Chandakkar, Parag Shridhar and Li, Baoxin},
     title = {Capturing Localized Image Artifacts through a CNN-based Hyper-image Representation},
     journal = {ArXiv},
     year = {2017}}
    
  46. P.S. Chandakkar & B. Li
    Investigating Human Factors in Image Forgery Detection
    ArXiv, 2017
    BibTeX
    @article{Chandakkar2017a,
     author = {Chandakkar, Parag S. and Li, Baoxin},
     title = {Investigating Human Factors in Image Forgery Detection},
     journal = {ArXiv},
     year = {2017}}
    
  47. B. Chen, H. Li & W. Luo
    Image Processing Operations Identification via Convolutional Neural Network
    arXiv, 2017
    BibTeX
    @article{Chen2017d,
     author = {Chen, Bolin and Li, Haodong and Luo, Weiqi},
     title = {Image Processing Operations Identification via Convolutional Neural Network},
     journal = {arXiv},
     year = {2017}}
    
  48. B. Chen, X. Qi, X. Sun & Y.-Q. Shi
    Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection
    Journal of Visual Communication and Image Representation, Elsevier BV, 2017
    DOI: 10.1016/j.jvcir.2017.08.011
    BibTeX
    @article{Chen2017b,
     author = {Chen, Beijing and Qi, Xiaoming and Sun, Xingming and Shi, Yun-Qing},
     title = {Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  49. C. Chen, S. McCloskey & J. Yu
    Image Splicing Detection via Camera Response Function Analysis
    Computer Vision Foundation (CVF), 2017
    BibTeX
    @article{Chen2017a,
     author = {Chen, Can and McCloskey, Scott and Yu, Jingyi},
     title = {Image Splicing Detection via Camera Response Function Analysis},
     journal = {Computer Vision Foundation (CVF)},
     year = {2017}}
    
  50. C. Chen, J. Ni, Z. Shen & Y.Q. Shi
    Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications
    IEEE Transactions on Image Processing, 2017, Vol. 26(6), pp. 2811-2824
    DOI: 10.1109/TIP.2017.2682963
    BibTeX
    @article{Chen2017e,
     author = {Chen, C. and Ni, J. and Shen, Z. and Shi, Y. Q.},
     title = {Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications},
     journal = {IEEE Transactions on Image Processing},
     year = {2017},
     volume = {26},
     number = {6},
     pages = {2811--2824}}
    
  51. C.-C. Chen, L.-Y. Chen & Y.-J. Lin
    Block Sampled Matching with Region Growing for Detecting Copy-Move Forgery Duplicated Regions
    Journal of Information Hiding and Multimedia Signal Processing, 2017
    BibTeX
    @article{Chen2017c,
     author = {Chen, Chien-Chang and Chen, Ling-Ying and Lin, Yu-Jing},
     title = {Block Sampled Matching with Region Growing for Detecting Copy-Move Forgery Duplicated Regions},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2017}}
    
  52. Z. Chen, Y. Zhao & R. Ni
    Detection of operation chain: JPEG-Resampling-JPEG
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 57, pp. 8-20
    DOI: 10.1016/j.image.2017.04.008
    BibTeX
    @article{Chen2017,
     author = {Chen, Zhipeng and Zhao, Yao and Ni, Rongrong},
     title = {Detection of operation chain: JPEG-Resampling-JPEG},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     pages = {8--20}}
    
  53. R. Chitra R & C. Minnu Jayan
    HUE Modification Detection and Estimation using Photo Response Non-Uniformity
    IJSTE - International Journal of Science Technology & Engineering, 2017
    BibTeX
    @article{ChitraR2017,
     author = {Chitra R, R. and Minnu Jayan, C.},
     title = {HUE Modification Detection and Estimation using Photo Response Non-Uniformity},
     journal = {IJSTE - International Journal of Science Technology & Engineering},
     year = {2017}}
    
  54. H.Y. Choi, H.U. Jang, D. Kim, J. Son, S.M. Mun, S. Choi & H.K. Lee
    Detecting composite image manipulation based on deep neural networks
    Proc. Signals and Image Processing (IWSSIP) 2017 Int. Conf. Systems
    2017, pp. 1-5
    DOI: 10.1109/IWSSIP.2017.7965621
    BibTeX
    @inproceedings{Choi2017b,
     author = {Choi, H. Y. and Jang, H. U. and Kim, D. and Son, J. and Mun, S. M. and Choi, S. and Lee, H. K.},
     title = {Detecting composite image manipulation based on deep neural networks},
     booktitle = {Proc. Signals and Image Processing (IWSSIP) 2017 Int. Conf. Systems},
     year = {2017},
     pages = {1--5}}
    
  55. H.-Y. Choi, D.-K. Hyun, S. Choi & H.-K. Lee
    Enhanced resampling detection based on image correlation of 3D stereoscopic images
    EURASIP Journal on Image and Video Processing, Springer, 2017, Vol. 2017(1), pp. 1
    DOI: 10.1186/s13640-017-0170-9
    BibTeX
    @article{Choi2017a,
     author = {Choi, Hak-Yeol and Hyun, Dai-Kyung and Choi, Sunghee and Lee, Heung-Kyu},
     title = {Enhanced resampling detection based on image correlation of 3D stereoscopic images},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2017},
     volume = {2017},
     number = {1},
     pages = {1}}
    
  56. H.-Y. Choi, H.-U. Jang, J. Son, D. Kim & H.-K. Lee
    Content Recapture Detection Based on Convolutional Neural Networks
    Information Science and Applications 2017
    Springer Nature, 2017, pp. 339-346
    DOI: 10.1007/978-981-10-4154-9_40
    BibTeX
    @incollection{Choi2017,
     author = {Choi, Hak-Yeol and Jang, Han-Ul and Son, Jeongho and Kim, Dongkyu and Lee, Heung-Kyu},
     title = {Content Recapture Detection Based on Convolutional Neural Networks},
     booktitle = {Information Science and Applications 2017},
     publisher = {Springer Nature},
     year = {2017},
     pages = {339--346}}
    
  57. F. Costa, A. Oliveira, P. Ferrara, Z. Dias, S. Goldenstein & A. Rocha
    New dissimilarity measures for image phylogeny reconstruction
    Pattern Analysis and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s10044-017-0616-9
    BibTeX
    @article{Costa2017,
     author = {Costa, Filipe and Oliveira, Alberto and Ferrara, Pasquale and Dias, Zanoni and Goldenstein, Siome and Rocha, Anderson},
     title = {New dissimilarity measures for image phylogeny reconstruction},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  58. D. Cozzolino, F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    PRNU-Based Forgery Localization in a Blind Scenario
    Image Analysis and Processing - ICIAP 2017, Springer, 2017
    DOI: 10.1007/978-3-319-68548-9_52
    BibTeX
    @article{Cozzolino2017a,
     author = {Cozzolino, Davide and Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {PRNU-Based Forgery Localization in a Blind Scenario},
     journal = {Image Analysis and Processing - ICIAP 2017},
     publisher = {Springer},
     year = {2017}}
    
  59. D. Cozzolino, G. Poggi & L. Verdoliva
    Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection
    arX, 2017
    BibTeX
    @article{Cozzolino2017,
     author = {Cozzolino, Davide and Poggi, Giovanni and Verdoliva, Luisa},
     title = {Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection},
     journal = {arX},
     year = {2017}}
    
  60. R. Cristin & V. Cyril Raj
    Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery
    Science China Information Sciences, Springer, 2017, Vol. 60(8), pp. 1
    DOI: 10.1007/s11432-016-0478-y
    BibTeX
    @article{Cristin2017,
     author = {Cristin, Rajan and Cyril Raj, Velankanni},
     title = {Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery},
     journal = {Science China Information Sciences},
     publisher = {Springer},
     year = {2017},
     volume = {60},
     number = {8},
     pages = {1}}
    
  61. F. Cruz, N. Sidère, M. Coustaty, V.P. D'Andecy & J.M. Ogier
    Local Binary Patterns for Document Forgery Detection
    Proc. 14th IAPR Int. Conf. Document Analysis and Recognition (ICDAR)
    2017, Vol. 01, pp. 1223-1228
    DOI: 10.1109/ICDAR.2017.202
    BibTeX
    @inproceedings{Cruz2017,
     author = {Cruz, F. and Sidère, N. and Coustaty, M. and D'Andecy, V. P. and Ogier, J. M.},
     title = {Local Binary Patterns for Document Forgery Detection},
     booktitle = {Proc. 14th IAPR Int. Conf. Document Analysis and Recognition (ICDAR)},
     year = {2017},
     volume = {01},
     pages = {1223--1228}}
    
  62. S. Dadkhah, M. Köppen, H.A. Jalab, S. Sadeghi, A.A. Manaf & D. Uliyan
    Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics
    Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods
    SCITEPRESS - Science and Technology Publications, 2017
    DOI: 10.5220/0006232206120619
    BibTeX
    @inproceedings{Dadkhah2017,
     author = {Dadkhah, Sajjad and Köppen, Mario and Jalab, Hamid A. and Sadeghi, Somayeh and Manaf, Azizah Abdul and Uliyan, Diaa},
     title = {Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics},
     booktitle = {Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods},
     publisher = {SCITEPRESS - Science and Technology Publications},
     year = {2017}}
    
  63. N.N. Dafale & R. Naskar
    Sensor pattern noise based source anonymization
    Proc. Signal Processing and Security (ICSSS) 2017 Third Int. Conf. Sensing
    2017, pp. 93-98
    DOI: 10.1109/SSPS.2017.8071572
    BibTeX
    @inproceedings{Dafale2017,
     author = {Dafale, N. N. and Naskar, R.},
     title = {Sensor pattern noise based source anonymization},
     booktitle = {Proc. Signal Processing and Security (ICSSS) 2017 Third Int. Conf. Sensing},
     year = {2017},
     pages = {93--98}}
    
  64. A.P. Dawid
    Forensic likelihood ratio: Statistical problems and pitfalls
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 73-75
    DOI: 10.1016/j.scijus.2016.09.002
    BibTeX
    @article{Dawid2017,
     author = {Dawid, A. Philip},
     title = {Forensic likelihood ratio: Statistical problems and pitfalls},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {73--75}}
    
  65. T. Dekel, M. Rubinstein, C. Liu & T. Freeman, William
    On the Effectiveness of Visible Watermarks
    CVPR ´17: Proceedings of the 2017 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´17)
    2017
    BibTeX
    @inproceedings{Dekel2017,
     author = {Dekel, Tali and Rubinstein, Michael and Liu, Ce and Freeman, William, T.},
     title = {On the Effectiveness of Visible Watermarks},
     booktitle = {CVPR ´17: Proceedings of the 2017 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´17)},
     year = {2017}}
    
  66. V.M. Devagiri
    Splicing Forgery Detection and the Impact of Image Resolution
    Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden, Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden, 2017
    BibTeX
    @mastersthesis{Devagiri2017,
     author = {Devagiri, Vishnu Manasa},
     title = {Splicing Forgery Detection and the Impact of Image Resolution},
     school = {Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden},
     year = {2017}}
    
  67. N. Dey, A.S. Ashour, S. Chakraborty, S. Banerjee, E. Gospodinova, M. Gospodinov & A.E. Hassanien
    Watermarking in Biomedical Signal Processing
    Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
    DOI: 10.1007/978-3-319-44790-2_16
    BibTeX
    @article{Dey2017,
     author = {Dey, Nilanjan and Ashour, Amira S. and Chakraborty, Sayan and Banerjee, Sukanya and Gospodinova, Evgeniya and Gospodinov, Mitko and Hassanien, Aboul Ella},
     title = {Watermarking in Biomedical Signal Processing},
     journal = {Intelligent Techniques in Signal Processing for Multimedia Security},
     publisher = {Springer},
     year = {2017}}
    
  68. R. Dixit, R. Naskar & S. Mishra
    Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD
    IET Image Proc, 2017, Vol. 11(5), pp. 301-309
    DOI: 10.1049/iet-ipr.2016.0537
    BibTeX
    @article{Dixit2017,
     author = {Dixit, R. and Naskar, R. and Mishra, S.},
     title = {Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD},
     journal = {IET Image Proc},
     year = {2017},
     volume = {11},
     number = {5},
     pages = {301--309}}
    
  69. M. Emam, Q. Han, Q. Li, H. Zhang & M. Emam
    A robust detection algorithm for image Copy-Move forgery in smooth regions
    Proc. System and Simulation (ICCSS) 2017 Int. Conf. Circuits
    2017, pp. 119-123
    DOI: 10.1109/CIRSYSSIM.2017.8023194
    BibTeX
    @inproceedings{Emam2017a,
     author = {Emam, M. and Han, Q. and Li, Q. and Zhang, H. and Emam, M.},
     title = {A robust detection algorithm for image Copy-Move forgery in smooth regions},
     booktitle = {Proc. System and Simulation (ICCSS) 2017 Int. Conf. Circuits},
     year = {2017},
     pages = {119--123}}
    
  70. M. Emam, Q. Han & H. Zhang
    Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images
    Journal of Forensic Sciences, Wiley-Blackwell, 2017
    DOI: 10.1111/1556-4029.13456
    BibTeX
    @article{Emam2017,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images},
     journal = {Journal of Forensic Sciences},
     publisher = {Wiley-Blackwell},
     year = {2017}}
    
  71. M. Faiz, N.B. Anuar, A.W.A. Wahab, S. Shamshirband & A.T. Chronopoulos
    Source camera identification: a distributed computing approach using Hadoop
    Journal of Cloud Computing, Springer, 2017, Vol. 6(1), pp. 1
    DOI: 10.1186/s13677-017-0088-x
    BibTeX
    @article{Faiz2017,
     author = {Faiz, Muhammad and Anuar, Nor Badrul and Wahab, Ainuddin Wahid Abdul and Shamshirband, Shahaboddin and Chronopoulos, Anthony T.},
     title = {Source camera identification: a distributed computing approach using Hadoop},
     journal = {Journal of Cloud Computing},
     publisher = {Springer},
     year = {2017},
     volume = {6},
     number = {1},
     pages = {1}}
    
  72. H. Farid
    How to Detect Faked Photos
    American Scientist, 2017
    BibTeX
    @article{Farid2017,
     author = {Farid, Hany},
     title = {How to Detect Faked Photos},
     journal = {American Scientist},
     year = {2017}}
    
  73. S. Farooq, M.H. Yousaf & F. Hussain
    A generic passive image forgery detection scheme using local binary pattern with rich models
    Computers & Electrical Engineering, Elsevier BV, 2017
    DOI: 10.1016/j.compeleceng.2017.05.008
    BibTeX
    @article{Farooq2017,
     author = {Farooq, Sundus and Yousaf, Muhammad Haroon and Hussain, Fawad},
     title = {A generic passive image forgery detection scheme using local binary pattern with rich models},
     journal = {Computers & Electrical Engineering},
     publisher = {Elsevier BV},
     year = {2017}}
    
  74. B. Feng, J. Weng & W. Lu
    Improved Algorithms for Robust Histogram Shape-Based Image Watermarking
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_21
    BibTeX
    @article{Feng2017,
     author = {Feng, Bingwen and Weng, Jian and Lu, Wei},
     title = {Improved Algorithms for Robust Histogram Shape-Based Image Watermarking},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  75. V. Ferraris, N. Dobigeon, Q. Wei & M. Chabert
    Change detection between multi-band images using a robust fusion-based approach
    Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics
    2017, pp. 3346-3350
    DOI: 10.1109/ICASSP.2017.7952776
    BibTeX
    @inproceedings{Ferraris2017,
     author = {Ferraris, V. and Dobigeon, N. and Wei, Q. and Chabert, M.},
     title = {Change detection between multi-band images using a robust fusion-based approach},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics},
     year = {2017},
     pages = {3346--3350}}
    
  76. V. Ferraris, N. Dobigeon, Q. Wei & M. Chabert
    Robust Fusion of Multiband Images With Different Spatial and Spectral Resolutions for Change Detection
    IEEE Transactions on Computational Imaging, 2017, Vol. 3(2), pp. 175-186
    DOI: 10.1109/TCI.2017.2692645
    BibTeX
    @article{Ferraris2017a,
     author = {Ferraris, V. and Dobigeon, N. and Wei, Q. and Chabert, M.},
     title = {Robust Fusion of Multiband Images With Different Spatial and Spectral Resolutions for Change Detection},
     journal = {IEEE Transactions on Computational Imaging},
     year = {2017},
     volume = {3},
     number = {2},
     pages = {175--186}}
    
  77. G.R. Franco
    Identificación de la Fuente en Ficheros Multimedia de Redes Sociales
    Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID, Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID, 2017
    BibTeX
    @thesis{Franco2017,
     author = {Franco, Guillermo Rodríguez},
     title = {Identificación de la Fuente en Ficheros Multimedia de Redes Sociales},
     school = {Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID},
     year = {2017}}
    
  78. D. Freire-Obregón, F. Narducci, S. Barra & M. Castrillón-Santana
    Deep learning for source camera identification on mobile devices
    ArXiv, 2017
    BibTeX
    @article{Freire-Obregon2017,
     author = {Freire-Obregón, David and Narducci, Fabio and Barra, Silvio and Castrillón-Santana, Modesto},
     title = {Deep learning for source camera identification on mobile devices},
     journal = {ArXiv},
     year = {2017}}
    
  79. T.D. Gadhiya, A.K. Roy, S.K. Mitra & V. Mall
    Use of discrete wavelet transform method for detection and localization of tampering in a digital medical image
    Proc. IEEE Region 10 Symp. (TENSYMP)
    2017, pp. 1-5
    DOI: 10.1109/TENCONSpring.2017.8070082
    BibTeX
    @inproceedings{Gadhiya2017,
     author = {Gadhiya, T. D. and Roy, A. K. and Mitra, S. K. and Mall, V.},
     title = {Use of discrete wavelet transform method for detection and localization of tampering in a digital medical image},
     booktitle = {Proc. IEEE Region 10 Symp. (TENSYMP)},
     year = {2017},
     pages = {1--5}}
    
  80. S. Georgievska, R. Bakhshi, A. Gavai, A. Sclocco & B. van Werkhoven
    Clustering image noise patterns by embedding and visualization for common source camera detection
    Digital Investigation, Elsevier BV, 2017
    DOI: 10.1016/j.diin.2017.08.005
    BibTeX
    @article{Georgievska2017,
     author = {Georgievska, Sonja and Bakhshi, Rena and Gavai, Anand and Sclocco, Alessio and van Werkhoven, Ben},
     title = {Clustering image noise patterns by embedding and visualization for common source camera detection},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  81. N.K. Gill, R. Garg & E.A. Doegar
    A review paper on digital image forgery detection techniques
    Proc. Communication and Networking Technologies (ICCCNT) 2017 8th Int. Conf. Computing
    2017, pp. 1-7
    DOI: 10.1109/ICCCNT.2017.8203904
    BibTeX
    @inproceedings{Gill2017,
     author = {Gill, N. K. and Garg, R. and Doegar, E. A.},
     title = {A review paper on digital image forgery detection techniques},
     booktitle = {Proc. Communication and Networking Technologies (ICCCNT) 2017 8th Int. Conf. Computing},
     year = {2017},
     pages = {1--7}}
    
  82. O. Giudice, A. Paratore, M. Moltisanti & S. Battiato
    A Classification Engine for Image Ballistics of Social Data
    Image Analysis and Processing - ICIAP 2017, Springer, 2017
    DOI: 10.1007/978-3-319-68548-9_57
    BibTeX
    @article{Giudice2017,
     author = {Giudice, Oliver and Paratore, Antonino and Moltisanti, Marco and Battiato, Sebastiano},
     title = {A Classification Engine for Image Ballistics of Social Data},
     journal = {Image Analysis and Processing - ICIAP 2017},
     publisher = {Springer},
     year = {2017}}
    
  83. L.I. Gonçalves
    Detecção Automática De Indícios De Fraude Em Assinaturas Em Documentos Digitais
    Instituto Federal De Educação, Ciência E Tecnologia De São Paulo, Instituto Federal De Educação, Ciência E Tecnologia De São Paulo, 2017
    BibTeX
    @phdthesis{Goncalves2017,
     author = {Gonçalves, Leandro Inácio},
     title = {Detecção Automática De Indícios De Fraude Em Assinaturas Em Documentos Digitais},
     school = {Instituto Federal De Educação, Ciência E Tecnologia De São Paulo},
     year = {2017}}
    
  84. W. Gu, G. Yang, D. Zhang & M. Xia
    A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix
    Cloud Computing and Security, Springer, 2017
    DOI: 10.1007/978-3-319-68542-7_35
    BibTeX
    @article{Gu2017,
     author = {Gu, Wenwu and Yang, Gaobo and Zhang, Dengyong and Xia, Ming},
     title = {A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2017}}
    
  85. D. Güera, Y. Wang, L. Bondi, P. Bestagini, S. Tubaro & E.J. Delp
    A Counter-Forensic Method for CNN-Based Camera Model Identification
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1840-1847
    DOI: 10.1109/CVPRW.2017.230
    BibTeX
    @inproceedings{Gueera2017,
     author = {Güera, D. and Wang, Y. and Bondi, L. and Bestagini, P. and Tubaro, S. and Delp, E. J.},
     title = {A Counter-Forensic Method for CNN-Based Camera Model Identification},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1840--1847}}
    
  86. A. Gupta
    Performance Enhancement of Copy-Move Forgery Detection by Using Shi Tomasi-Surf Detector and Surf-PSO Algorithm
    Thapar University, Thapar University, 2017
    BibTeX
    @mastersthesis{Gupta2017,
     author = {Gupta, Anmol},
     title = {Performance Enhancement of Copy-Move Forgery Detection by Using Shi Tomasi-Surf Detector and Surf-PSO Algorithm},
     school = {Thapar University},
     year = {2017}}
    
  87. H.G. Hadigheh & G. bin sulong
    Feature base fusion for splicing forgery detection based on neuro fuzzy
    arXiv, 2017
    BibTeX
    @article{Hadigheh2017,
     author = {Hadigheh, Habib Ghaffari and bin sulong, Ghazali},
     title = {Feature base fusion for splicing forgery detection based on neuro fuzzy},
     journal = {arXiv},
     year = {2017}}
    
  88. B. Harjito & H. Prasetyo
    Image forensics using EDBTC feature
    Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)
    2017, pp. 167-168
    DOI: 10.1109/ICCE-China.2017.7991048
    BibTeX
    @inproceedings{Harjito2017,
     author = {Harjito, B. and Prasetyo, H.},
     title = {Image forensics using EDBTC feature},
     booktitle = {Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)},
     year = {2017},
     pages = {167--168}}
    
  89. B. Harjito & H. Prasetyo
    Image forensics using EDBTC feature
    Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)
    2017, pp. 167-168
    DOI: 10.1109/ICCE-China.2017.7991048
    BibTeX
    @inproceedings{Harjito2017a,
     author = {Harjito, B. and Prasetyo, H.},
     title = {Image forensics using EDBTC feature},
     booktitle = {Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)},
     year = {2017},
     pages = {167--168}}
    
  90. K. Hayat & T. Qazi
    Forgery detection in digital images via discrete wavelet and discrete cosine transforms
    Computers & Electrical Engineering, Elsevier BV, 2017
    DOI: 10.1016/j.compeleceng.2017.03.013
    BibTeX
    @article{Hayat2017,
     author = {Hayat, Khizar and Qazi, Tanzeela},
     title = {Forgery detection in digital images via discrete wavelet and discrete cosine transforms},
     journal = {Computers & Electrical Engineering},
     publisher = {Elsevier BV},
     year = {2017}}
    
  91. X. He, Q. Guan, Y. Tong, X. Zhao & H. Yu
    A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_11
    BibTeX
    @article{He2017,
     author = {He, Xin and Guan, Qingxiao and Tong, Yanfei and Zhao, Xianfeng and Yu, Haibo},
     title = {A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  92. A. Hilal, T. Hamzeh & S. Chantaf
    Copy-move forgery detection using principal component analysis and discrete cosine transform
    Proc. Sensors Networks Smart and Emerging Technologies (SENSET)
    2017, pp. 1-4
    DOI: 10.1109/SENSET.2017.8125021
    BibTeX
    @inproceedings{Hilal2017a,
     author = {Hilal, A. and Hamzeh, T. and Chantaf, S.},
     title = {Copy-move forgery detection using principal component analysis and discrete cosine transform},
     booktitle = {Proc. Sensors Networks Smart and Emerging Technologies (SENSET)},
     year = {2017},
     pages = {1--4}}
    
  93. M.V. Hilal, P. Yannawar & A.T. Gaikwad
    Image inconsistency detection using histogram of orientated gradient (HOG)
    Proc. 1st Int. Conf. Intelligent Systems and Information Management (ICISIM)
    2017, pp. 22-25
    DOI: 10.1109/ICISIM.2017.8122141
    BibTeX
    @inproceedings{Hilal2017,
     author = {Hilal, M. V. and Yannawar, P. and Gaikwad, A. T.},
     title = {Image inconsistency detection using histogram of orientated gradient (HOG)},
     booktitle = {Proc. 1st Int. Conf. Intelligent Systems and Information Management (ICISIM)},
     year = {2017},
     pages = {22--25}}
    
  94. M. Hildebrandt, T. Neubert, A. Makrushin & J. Dittmann
    Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps
    Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)
    2017, pp. 1-6
    DOI: 10.1109/IWBF.2017.7935087
    BibTeX
    @inproceedings{Hildebrandt2017,
     author = {Hildebrandt, M. and Neubert, T. and Makrushin, A. and Dittmann, J.},
     title = {Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps},
     booktitle = {Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)},
     year = {2017},
     pages = {1--6}}
    
  95. Y. Hold-Geoffroy, K. Sunkavalli, J. Eisenmann, M. Fisher, E. Gambaretto, S. Hadap & J.-F. Lalonde
    A Perceptual Measure for Deep Single Image Camera Calibration
    ArXiv, 2017
    BibTeX
    @article{Hold-Geoffroy2017,
     author = {Hold-Geoffroy, Yannick and Sunkavalli, Kalyan and Eisenmann, Jonathan and Fisher, Matt and Gambaretto, Emiliano and Hadap, Sunil and Lalonde, Jean-François},
     title = {A Perceptual Measure for Deep Single Image Camera Calibration},
     journal = {ArXiv},
     year = {2017}}
    
  96. M.S. Hossain, M.F. Alhamid & G. Muhammad
    Collaborative analysis model for trending images on social networks
    Future Generation Computer Systems, Elsevier BV, 2017
    DOI: 10.1016/j.future.2017.01.030
    BibTeX
    @article{Hossain2017,
     author = {Hossain, M. Shamim and Alhamid, Mohammed F. and Muhammad, Ghulam},
     title = {Collaborative analysis model for trending images on social networks},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier BV},
     year = {2017}}
    
  97. M. Hu, X. Wang, G. Xu & H. Yu
    A Detection Method for Copy- Move Image Forgery Using Frequency -Based Techniques
    Journal of Image and Signal Processing, Hans Publishers, 2017, Vol. 06(01), pp. 8-16
    DOI: 10.12677/jisp.2017.61002
    BibTeX
    @article{Hu2017,
     author = {Hu, Meidong and Wang, Xiaotong and Xu, Guanlei and Yu, Hao},
     title = {A Detection Method for Copy- Move Image Forgery Using Frequency -Based Techniques},
     journal = {Journal of Image and Signal Processing},
     publisher = {Hans Publishers},
     year = {2017},
     volume = {06},
     number = {01},
     pages = {8--16}}
    
  98. Y.-C. Hu, K.-K.R. Choo & W.-L. Chen
    Tamper detection and image recovery for BTC-compressed images
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(14), pp. 15435
    DOI: 10.1007/s11042-016-3847-7
    BibTeX
    @article{Hu2017a,
     author = {Hu, Yu-Chen and Choo, Kim-Kwang Raymond and Chen, Wu-Lin},
     title = {Tamper detection and image recovery for BTC-compressed images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {14},
     pages = {15435}}
    
  99. M.M. Isaac & M. Wilscy
    Multiscale Local Gabor Phase Quantization for image forgery detection
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5189-5
    BibTeX
    @article{Isaac2017,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Multiscale Local Gabor Phase Quantization for image forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  100. V.I. Ivanov & J.S. Baras
    Authentication of Swipe Fingerprint Scanners
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2212-2226
    DOI: 10.1109/TIFS.2017.2702592
    BibTeX
    @article{Ivanov2017,
     author = {Ivanov, V. I. and Baras, J. S.},
     title = {Authentication of Swipe Fingerprint Scanners},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {9},
     pages = {2212--2226}}
    
  101. H. Jain, J. Das, H.K. Verma & N. Khanna
    An enhanced statistical approach for median filtering detection using difference image
    Proc. Security and Behavior Analysis (ISBA) 2017 IEEE Int. Conf. Identity
    2017, pp. 1-7
    DOI: 10.1109/ISBA.2017.7947704
    BibTeX
    @inproceedings{Jain2017,
     author = {Jain, H. and Das, J. and Verma, H. K. and Khanna, N.},
     title = {An enhanced statistical approach for median filtering detection using difference image},
     booktitle = {Proc. Security and Behavior Analysis (ISBA) 2017 IEEE Int. Conf. Identity},
     year = {2017},
     pages = {1--7}}
    
  102. M. Javanmard & R. Refayen
    Using Sensor Pattern Noise for Camera Identification
    International Journal of Computer Science and Information Security, 2017
    BibTeX
    @article{Javanmard2017,
     author = {Javanmard, Mahdi and Refayen, Raheleh},
     title = {Using Sensor Pattern Noise for Camera Identification},
     journal = {International Journal of Computer Science and Information Security},
     year = {2017}}
    
  103. J.J. Jeon, H.J. Shin & I.K. Eom
    Estimation of Bayer CFA pattern configuration based on singular value decomposition
    EURASIP Journal on Image and Video Processing, Springer Nature, 2017, Vol. 2017(1)
    DOI: 10.1186/s13640-017-0196-z
    BibTeX
    @article{Jeon2017,
     author = {Jeon, Jong Ju and Shin, Hyun Jun and Eom, Il Kyu},
     title = {Estimation of Bayer CFA pattern configuration based on singular value decomposition},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer Nature},
     year = {2017},
     volume = {2017},
     number = {1}}
    
  104. X. Jiang, P. He, T. Sun, F. Xie & S. Wang
    Detection of Double Compression with the Same Coding Parameters Based on Quality Degradation Mechanism Analysis
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2745687
    BibTeX
    @article{Jiang2017,
     author = {Jiang, X. and He, P. and Sun, T. and Xie, F. and Wang, S.},
     title = {Detection of Double Compression with the Same Coding Parameters Based on Quality Degradation Mechanism Analysis},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  105. T. Julliand, V. Nozick, I. Echizen & H. Talbot
    Using The Noise Density Down Projection To Expose Splicing In JPEG Images
    2017
    BibTeX
    @electronic{Julliand2017,
     author = {Julliand, Thibault and Nozick, Vincent and Echizen, Isao and Talbot, Hugues},
     title = {Using The Noise Density Down Projection To Expose Splicing In JPEG Images},
     year = {2017}}
    
  106. D.-J. Jung & H.-K. Lee
    Frame-rate conversion detection based on periodicity of motion artifact
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4519-y
    BibTeX
    @article{Jung2017,
     author = {Jung, Dae-Jin and Lee, Heung-Kyu},
     title = {Frame-rate conversion detection based on periodicity of motion artifact},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  107. M.F. Jwaid & T.N. Baraskar
    Study and analysis of copy-move splicing image forgery detection techniques
    Proc. Analytics and Cloud) (I-SMAC) 2017 Int. Conf. I-SMAC (IoT in Social, Mobile
    2017, pp. 697-702
    DOI: 10.1109/I-SMAC.2017.8058268
    BibTeX
    @inproceedings{Jwaid2017,
     author = {Jwaid, M. F. and Baraskar, T. N.},
     title = {Study and analysis of copy-move splicing image forgery detection techniques},
     booktitle = {Proc. Analytics and Cloud) (I-SMAC) 2017 Int. Conf. I-SMAC (IoT in Social, Mobile},
     year = {2017},
     pages = {697--702}}
    
  108. N. Kanagavalli & L. Latha
    A survey of copy-move image forgery detection techniques
    Proc. Int. Conf. Inventive Systems and Control (ICISC)
    2017, pp. 1-6
    DOI: 10.1109/ICISC.2017.8068703
    BibTeX
    @inproceedings{Kanagavalli2017,
     author = {Kanagavalli, N. and Latha, L.},
     title = {A survey of copy-move image forgery detection techniques},
     booktitle = {Proc. Int. Conf. Inventive Systems and Control (ICISC)},
     year = {2017},
     pages = {1--6}}
    
  109. A. Kashyap, R.S. Parmar, M. Agrawal & H. Gupta
    An Evaluation of Digital Image Forgery Detection Approaches
    arX, 2017
    BibTeX
    @article{Kashyap2017,
     author = {Kashyap, Abhishek and Parmar, Rajesh Singh and Agrawal, Megha and Gupta, Hariom},
     title = {An Evaluation of Digital Image Forgery Detection Approaches},
     journal = {arX},
     year = {2017}}
    
  110. M. Kaur & S. Gupta
    A fusion framework based on fuzzy integrals for passive-blind image tamper detection
    Cluster Computing, Springer, 2017, pp. 1
    DOI: 10.1007/s10586-017-1393-3
    BibTeX
    @article{Kaur2017,
     author = {Kaur, Mandeep and Gupta, Savita},
     title = {A fusion framework based on fuzzy integrals for passive-blind image tamper detection},
     journal = {Cluster Computing},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  111. W.C.N. Kaura & S. Dhavale
    Analysis of SIFT and SURF features for copy-move image forgery detection
    Proc. Embedded and Communication Systems (ICIIECS) 2017 Int. Conf. Innovations in Information
    2017, pp. 1-4
    DOI: 10.1109/ICIIECS.2017.8276160
    BibTeX
    @inproceedings{Kaura2017,
     author = {Kaura, W. C. N. and Dhavale, S.},
     title = {Analysis of SIFT and SURF features for copy-move image forgery detection},
     booktitle = {Proc. Embedded and Communication Systems (ICIIECS) 2017 Int. Conf. Innovations in Information},
     year = {2017},
     pages = {1--4}}
    
  112. D.-G. Kim, J.-U. Hou & H.-K. Lee
    Learning deep features for source color laser printer identification based on cascaded learning
    arXiv, 2017
    BibTeX
    @article{Kim2017,
     author = {Kim, Do-Guk and Hou, Jong-Uk and Lee, Heung-Kyu},
     title = {Learning deep features for source color laser printer identification based on cascaded learning},
     journal = {arXiv},
     year = {2017}}
    
  113. D.-H. Kim & H.-Y. Le
    Image Manipulation Detection using Convolutional Neural Network
    International Journal of Applied Engineering Research, 2017
    BibTeX
    @article{Kim2017a,
     author = {Kim, Dong-Hyun and Le, Hae-Yeoun},
     title = {Image Manipulation Detection using Convolutional Neural Network},
     journal = {International Journal of Applied Engineering Research},
     year = {2017}}
    
  114. S. Kingra, N. Aggarwal & R.D. Singh
    Inter-frame forgery detection in H.264 videos using motion and brightness gradients
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4762-2
    BibTeX
    @article{Kingra2017,
     author = {Kingra, Staffy and Aggarwal, Naveen and Singh, Raahat Devender},
     title = {Inter-frame forgery detection in H.264 videos using motion and brightness gradients},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  115. P. Korus
    Digital image integrity – a survey of protection and verification techniques
    Digital Signal Processing, Elsevier BV, 2017
    DOI: 10.1016/j.dsp.2017.08.009
    BibTeX
    @article{Korus2017,
     author = {Korus, Paweł},
     title = {Digital image integrity – a survey of protection and verification techniques},
     journal = {Digital Signal Processing},
     publisher = {Elsevier BV},
     year = {2017}}
    
  116. A. Kuznetsov
    A Copy-Move Detection Algorithm Based on Geometric Local Binary Pattern
    Digital Communication. Towards a Smart and Secure Future Internet
    Springer, 2017
    DOI: 10.1007/978-3-319-67639-5_7
    BibTeX
    @incollection{Kuznetsov2017b,
     author = {Kuznetsov, Andrey},
     title = {A Copy-Move Detection Algorithm Based on Geometric Local Binary Pattern},
     booktitle = {Digital Communication. Towards a Smart and Secure Future Internet},
     publisher = {Springer},
     year = {2017}}
    
  117. A. Kuznetsov & V. Myasnikov
    Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task
    Analysis of Images, Social Networks and Texts, Springer, 2017
    DOI: 10.1007/978-3-319-52920-2_28
    BibTeX
    @article{Kuznetsov2017,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task},
     journal = {Analysis of Images, Social Networks and Texts},
     publisher = {Springer},
     year = {2017}}
    
  118. A. Kuznetsov & V. Myasnikov
    A new copy-move forgery detection algorithm using image preprocessing procedure
    Procedia Engineering, Elsevier BV, 2017, Vol. 201, pp. 436-444
    DOI: 10.1016/j.proeng.2017.09.671
    BibTeX
    @article{Kuznetsov2017a,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {A new copy-move forgery detection algorithm using image preprocessing procedure},
     journal = {Procedia Engineering},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {201},
     pages = {436--444}}
    
  119. Y. Lai, T. Huang, J. Lin & H. Lu
    An improved block-based matching algorithm of copy-move forgery detection
    Multimedia Tools and Applications, Springer Nature, 2017
    DOI: 10.1007/s11042-017-5094-y
    BibTeX
    @article{Lai2017,
     author = {Lai, Yuecong and Huang, Tianqiang and Lin, Jing and Lu, Henan},
     title = {An improved block-based matching algorithm of copy-move forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2017}}
    
  120. A. Lawgaly
    Digital Camera Identification Using Sensor Pattern Noise for Forensics Applications
    Northumbria University, Northumbria University, 2017
    BibTeX
    @phdthesis{Lawgaly2017,
     author = {Lawgaly, Ashref},
     title = {Digital Camera Identification Using Sensor Pattern Noise for Forensics Applications},
     school = {Northumbria University},
     year = {2017}}
    
  121. S.-h. Lee, D.-h. Kim, T.-w. Oh, K.-b. Kim & H.-y. Lee
    Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering -- 모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술
    KIPS Tr. Software and Data Eng., 2017, Vol. 6(1)
    DOI: 10.3745/KTSDE.2017.6.1.15
    BibTeX
    @article{Lee2017,
     author = {Lee, Sang-hyeong and Kim, Dong-hyun and Oh, Tae-woo and Kim, Ki-bom and Lee, Hae-yeoun},
     title = {Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering -- 모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술},
     journal = {KIPS Tr. Software and Data Eng.},
     year = {2017},
     volume = {6},
     number = {1}}
    
  122. T. Le-Tien, T. Huynh-Kha, L.P. Cong-Hoan & A. Tran-Hong
    Combined Zernike Moment and Multiscale Analysis for Tamper Detection in Digital Images
    Informatica, 2017, Vol. 41, pp. 59-70
    BibTeX
    @article{Le-Tien2017,
     author = {Le-Tien, Thuong and Huynh-Kha, Tu and Cong-Hoan, Long Pham and Tran-Hong, An},
     title = {Combined Zernike Moment and Multiscale Analysis for Tamper Detection in Digital Images},
     journal = {Informatica},
     year = {2017},
     volume = {41},
     pages = {59--70}}
    
  123. T. Le-Tien, T. Huynh-Kha, T. Nguyen-Thanh, T. Pham-Duc & T. Nguyen-Huu
    An evaluation on the effective processing time of Raspberry Pi-3B-based embedded systems for determining forged images
    Proc. 4th NAFOSTED Conf. Information and Computer Science
    2017, pp. 213-218
    DOI: 10.1109/NAFOSTED.2017.8108066
    BibTeX
    @inproceedings{Le-Tien2017a,
     author = {Le-Tien, T. and Huynh-Kha, T. and Nguyen-Thanh, T. and Pham-Duc, T. and Nguyen-Huu, T.},
     title = {An evaluation on the effective processing time of Raspberry Pi-3B-based embedded systems for determining forged images},
     booktitle = {Proc. 4th NAFOSTED Conf. Information and Computer Science},
     year = {2017},
     pages = {213--218}}
    
  124. A. Li, S. Zhou & R. Wang
    An Improved Method for Eliminating Ghosting in Image Stitching
    Proc. 9th Int. Conf. Intelligent Human-Machine Systems and Cybernetics (IHMSC)
    2017, Vol. 2, pp. 415-418
    DOI: 10.1109/IHMSC.2017.205
    BibTeX
    @inproceedings{Li2017f,
     author = {Li, A. and Zhou, S. and Wang, R.},
     title = {An Improved Method for Eliminating Ghosting in Image Stitching},
     booktitle = {Proc. 9th Int. Conf. Intelligent Human-Machine Systems and Cybernetics (IHMSC)},
     year = {2017},
     volume = {2},
     pages = {415--418}}
    
  125. C.-T. Li & X. Lin
    A fast source-oriented image clustering method for digital forensics
    EURASIP Journal on Image and Video Processing, Springer Nature, 2017, Vol. 2017(1)
    DOI: 10.1186/s13640-017-0217-y
    BibTeX
    @article{Li2017e,
     author = {Li, Chang-Tsun and Lin, Xufeng},
     title = {A fast source-oriented image clustering method for digital forensics},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer Nature},
     year = {2017},
     volume = {2017},
     number = {1}}
    
  126. D. Li, L. Yuan, S. Hu & Z. Wang
    Research on Image Splicing Based on Weighted Poisson Fusion
    International Journal of Computer Science Engineering (IJCSE), 2017
    BibTeX
    @article{Li2017d,
     author = {Li, Dan and Yuan, Ling and Hu, Song and Wang, Zeqi},
     title = {Research on Image Splicing Based on Weighted Poisson Fusion},
     journal = {International Journal of Computer Science Engineering (IJCSE)},
     year = {2017}}
    
  127. F. Li, M. Xin, J. Li & J. Yu
    Improved detection for copy-move forgery with multi-scale sliding windows
    Proc. Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS)
    2017, pp. 231-236
    DOI: 10.1109/ISPACS.2017.8266479
    BibTeX
    @inproceedings{Li2017h,
     author = {Li, F. and Xin, M. and Li, J. and Yu, J.},
     title = {Improved detection for copy-move forgery with multi-scale sliding windows},
     booktitle = {Proc. Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS)},
     year = {2017},
     pages = {231--236}}
    
  128. H. Li, W. Luo, X. qiu & J. Huang
    Image Forgery Localization via Integrating Tampering Possibility Maps
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656823
    BibTeX
    @article{Li2017,
     author = {Li, H. and Luo, W. and qiu, X. and Huang, J.},
     title = {Image Forgery Localization via Integrating Tampering Possibility Maps},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  129. H. Li, W. Luo & J. Huang
    Localization of Diffusion-Based Inpainting in Digital Images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 3050-3064
    DOI: 10.1109/TIFS.2017.2730822
    BibTeX
    @article{Li2017b,
     author = {Li, H. and Luo, W. and Huang, J.},
     title = {Localization of Diffusion-Based Inpainting in Digital Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {12},
     pages = {3050--3064}}
    
  130. H. Li, W. Luo, Q. Rao & J. Huang
    Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack
    arXiv, 2017
    BibTeX
    @article{Li2017c,
     author = {Li, Haodong and Luo, Weiqi and Rao, Quanquan and Huang, Jiwu},
     title = {Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack},
     journal = {arXiv},
     year = {2017}}
    
  131. X. Li, W. Xu, S. Wang & X. Qu
    Are You Lying: Validating the Time-Location of Outdoor Images
    Applied Cryptography and Network Security, Springer, 2017
    DOI: 10.1007/978-3-319-61204-1_6
    BibTeX
    @article{Li2017g,
     author = {Li, Xiaopeng and Xu, Wenyuan and Wang, Song and Qu, Xianshan},
     title = {Are You Lying: Validating the Time-Location of Outdoor Images},
     journal = {Applied Cryptography and Network Security},
     publisher = {Springer},
     year = {2017}}
    
  132. Y. Li, J. Zhou & A. Cheng
    SIFT Keypoint Removal via Directed Graph Construction for Color Images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 2971-2985
    DOI: 10.1109/TIFS.2017.2730362
    BibTeX
    @article{Li2017a,
     author = {Li, Y. and Zhou, J. and Cheng, A.},
     title = {SIFT Keypoint Removal via Directed Graph Construction for Color Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {12},
     pages = {2971--2985}}
    
  133. D. Liang, C. Lu & H. Jin
    Soft multimedia anomaly detection based on neural network and optimization driven support vector machine
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5352-z
    BibTeX
    @article{Liang2017,
     author = {Liang, Dong and Lu, Chen and Jin, Hao},
     title = {Soft multimedia anomaly detection based on neural network and optimization driven support vector machine},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  134. C. Lin, W. Lu, W. Sun, J. Zeng, T. Xu & J.-H. Lai
    Region duplication detection based on image segmentation and keypoint contexts
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5027-9
    BibTeX
    @article{Lin2017,
     author = {Lin, Cong and Lu, Wei and Sun, Wei and Zeng, Jinhua and Xu, Tianhua and Lai, Jian-Huang},
     title = {Region duplication detection based on image segmentation and keypoint contexts},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  135. R. Lionnie, R.B. Bahaweres, S. Attamimi & M. Alaydrus
    A study on pre-processing methods for copy-move forgery detection based on SIFT
    Proc. TENCON 2017 - 2017 IEEE Region 10 Conf
    2017, pp. 1142-1147
    DOI: 10.1109/TENCON.2017.8228029
    BibTeX
    @inproceedings{Lionnie2017,
     author = {Lionnie, R. and Bahaweres, R. B. and Attamimi, S. and Alaydrus, M.},
     title = {A study on pre-processing methods for copy-move forgery detection based on SIFT},
     booktitle = {Proc. TENCON 2017 - 2017 IEEE Region 10 Conf},
     year = {2017},
     pages = {1142--1147}}
    
  136. A. Liu, Z. Zhao, C. Zhang & Y. Su
    Median filtering forensics in digital images based on frequency-domain features
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(21), pp. 22119
    DOI: 10.1007/s11042-017-4845-0
    BibTeX
    @article{Liu2017h,
     author = {Liu, Anan and Zhao, Zhengyu and Zhang, Chengqian and Su, Yuting},
     title = {Median filtering forensics in digital images based on frequency-domain features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {21},
     pages = {22119}}
    
  137. B. Liu & C.M. Pun
    Multi-object splicing forgery detection using noise level difference
    Proc. IEEE Conf. Dependable and Secure Computing
    2017, pp. 533-534
    DOI: 10.1109/DESEC.2017.8073884
    BibTeX
    @inproceedings{Liu2017f,
     author = {Liu, B. and Pun, C. M.},
     title = {Multi-object splicing forgery detection using noise level difference},
     booktitle = {Proc. IEEE Conf. Dependable and Secure Computing},
     year = {2017},
     pages = {533--534}}
    
  138. C. Liu & M. Kirchner
    Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise
    2017
    BibTeX
    @unpublished{Liu2017b,
     author = {Liu, Chang and Kirchner, Matthias},
     title = {Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise},
     year = {2017}}
    
  139. Q. Liu
    An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics
    Pattern Recognition, Elsevier BV, 2017, Vol. 65, pp. 35-46
    DOI: 10.1016/j.patcog.2016.12.010
    BibTeX
    @article{Liu2017a,
     author = {Liu, Qingzhong},
     title = {An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics},
     journal = {Pattern Recognition},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {65},
     pages = {35--46}}
    
  140. Y. Liu, Q. Guan & X. Zhao
    Copy-move Forgery Detection based on Convolutional Kernel Network
    arXiv, 2017
    BibTeX
    @article{Liu2017c,
     author = {Liu, Yaqi and Guan, Qingxiao and Zhao, Xianfeng},
     title = {Copy-move Forgery Detection based on Convolutional Kernel Network},
     journal = {arXiv},
     year = {2017}}
    
  141. Y. Liu, Q. Guan & X. Zhao
    Copy-move forgery detection based on convolutional kernel network
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5374-6
    BibTeX
    @article{Liu2017g,
     author = {Liu, Yaqi and Guan, Qingxiao and Zhao, Xianfeng},
     title = {Copy-move forgery detection based on convolutional kernel network},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  142. Y. Liu, Y. Huang, J. Zhang, X. Liu & H. Shen
    Noisy Smoothing Image Source Identification
    Cyberspace Safety and Security
    Springer International Publishing, 2017, pp. 135-147
    DOI: 10.1007/978-3-319-69471-9_10
    BibTeX
    @incollection{Liu2017d,
     author = {Liu, Yuying and Huang, Yonggang and Zhang, Jun and Liu, Xu and Shen, Hualei},
     title = {Noisy Smoothing Image Source Identification},
     booktitle = {Cyberspace Safety and Security},
     publisher = {Springer International Publishing},
     year = {2017},
     pages = {135--147}}
    
  143. Y. Liu, R. Ni & Y. Zhao
    Forensics of Operation History Including Image Blurring and Noise Addition based on Joint Features
    Advances in Intelligent Information Hiding and Multimedia Signal Processing
    Springer, 2017
    DOI: 10.1007/978-3-319-50212-0_11
    BibTeX
    @incollection{Liu2017,
     author = {Liu, Yahui and Ni, Rongrong and Zhao, Yao},
     title = {Forensics of Operation History Including Image Blurring and Noise Addition based on Joint Features},
     booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing},
     publisher = {Springer},
     year = {2017}}
    
  144. Y. Liu, H.-X. Wang, H.-Z. Wu & Y. Chen
    An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points
    Cloud Computing and Security, Springer, 2017
    DOI: 10.1007/978-3-319-68505-2_6
    BibTeX
    @article{Liu2017e,
     author = {Liu, Yong and Wang, Hong-Xia and Wu, Han-Zhou and Chen, Yi},
     title = {An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2017}}
    
  145. M. Long, F. Peng & Y. Zhu
    Identifying natural images and computer generated graphics based on binary similarity measures of PRNU
    Multimedia Tools and Applications, Springer Nature, 2017
    DOI: 10.1007/s11042-017-5101-3
    BibTeX
    @article{Long2017,
     author = {Long, Min and Peng, Fei and Zhu, Yin},
     title = {Identifying natural images and computer generated graphics based on binary similarity measures of PRNU},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2017}}
    
  146. R.R. López
    Identificación De La Fuente En Vídeos De Dispositivos Móviles
    Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, 2017
    BibTeX
    @mastersthesis{Lopez2017,
     author = {López, Raquel Ramos},
     title = {Identificación De La Fuente En Vídeos De Dispositivos Móviles},
     school = {Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid},
     year = {2017}}
    
  147. F. Luan, S. Paris, E. Shechtman & K. Bala
    Deep Photo Style Transfer
    arXiv, 2017
    BibTeX
    @article{Luan2017,
     author = {Luan, Fujun and Paris, Sylvain and Shechtman, Eli and Bala, Kavita},
     title = {Deep Photo Style Transfer},
     journal = {arXiv},
     year = {2017}}
    
  148. Y. Lyu, X. Shen & H. Chen
    Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector
    Chinese Journal of Electronics, 2017
    BibTeX
    @article{Lyu2017,
     author = {Lyu, Y. and Shen, X. and Chen, H.},
     title = {Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector},
     journal = {Chinese Journal of Electronics},
     year = {2017}}
    
  149. B. Mader, M.S. Banks & H. Farid
    Identifying Computer-Generated Portraits: The Importance of Training and Incentives
    Perception, SAGE Publications, 2017, Vol. 46(9), pp. 1062-1076
    DOI: 10.1177/0301006617713633
    BibTeX
    @article{Mader2017,
     author = {Mader, Brandon and Banks, Martin S. and Farid, Hany},
     title = {Identifying Computer-Generated Portraits: The Importance of Training and Incentives},
     journal = {Perception},
     publisher = {SAGE Publications},
     year = {2017},
     volume = {46},
     number = {9},
     pages = {1062--1076}}
    
  150. V.H. Mahale, M.M.H. Ali, P.L. Yannawar & A.T. Gaikwad
    Image Inconsistency Detection Using Local Binary Pattern (LBP)
    Procedia Computer Science, Elsevier BV, 2017, Vol. 115, pp. 501-508
    DOI: 10.1016/j.procs.2017.09.097
    BibTeX
    @article{Mahale2017,
     author = {Mahale, Vivek H. and Ali, Mouad M. H. and Yannawar, Pravin L. and Gaikwad, Ashok T.},
     title = {Image Inconsistency Detection Using Local Binary Pattern (LBP)},
     journal = {Procedia Computer Science},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {115},
     pages = {501--508}}
    
  151. T. Mahmood, A. Irtaza, Z. Mehmood & M.T. Mahmood
    Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images
    Forensic Science International, Elsevier BV, 2017, Vol. 279, pp. 8-21
    DOI: 10.1016/j.forsciint.2017.07.037
    BibTeX
    @article{Mahmood2017,
     author = {Mahmood, Toqeer and Irtaza, Aun and Mehmood, Zahid and Mahmood, Muhammad Tariq},
     title = {Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {279},
     pages = {8--21}}
    
  152. T. Mahmood, Z. Mehmood, M. Shah & Z. Khan
    An efficient forensic technique for exposing region duplication forgery in digital images
    Applied Intelligence, Springer, 2017, pp. 1
    DOI: 10.1007/s10489-017-1038-5
    BibTeX
    @article{Mahmood2017a,
     author = {Mahmood, Toqeer and Mehmood, Zahid and Shah, Mohsin and Khan, Zakir},
     title = {An efficient forensic technique for exposing region duplication forgery in digital images},
     journal = {Applied Intelligence},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  153. C. Maigrot, E. Kijak, R. Sicre & V. Claveau
    Tampering Detection and Localization in Images from Social Networks: A CBIR Approach
    Image Analysis and Processing - ICIAP 2017, Springer, 2017
    DOI: 10.1007/978-3-319-68560-1_67
    BibTeX
    @article{Maigrot2017,
     author = {Maigrot, Cedric and Kijak, Ewa and Sicre, Ronan and Claveau, Vincent},
     title = {Tampering Detection and Localization in Images from Social Networks: A CBIR Approach},
     journal = {Image Analysis and Processing - ICIAP 2017},
     publisher = {Springer},
     year = {2017}}
    
  154. P. Malik
    Limitation of PFA-Events as a Forensic Tool
    2017
    BibTeX
    @electronic{Malik2017,
     author = {Malik, Parveen},
     title = {Limitation of PFA-Events as a Forensic Tool},
     year = {2017}}
    
  155. P. Malik & K. Karthik
    Iterative content adaptable purple fringe detection
    Signal, Image and Video Processing, Springer, 2017, pp. 1
    DOI: 10.1007/s11760-017-1144-1
    BibTeX
    @article{Malik2017a,
     author = {Malik, Parveen and Karthik, Kannan},
     title = {Iterative content adaptable purple fringe detection},
     journal = {Signal, Image and Video Processing},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  156. S. Mandelli, L. Bondi, S. Lameri, V. Lipari, P. Bestagini & S. Tubaro
    Inpainting-based Camera Anonymization
    Proc of the ICIP 2017
    Pr, 2017
    BibTeX
    @inproceedings{Mandelli2017,
     author = {Mandelli, Sara and Bondi, Luca and Lameri, Silvia and Lipari, Vincenzo and Bestagini, Paolo and Tubaro, Stefano},
     title = {Inpainting-based Camera Anonymization},
     booktitle = {Proc of the ICIP 2017},
     journal = {Pr},
     year = {2017}}
    
  157. V.T. Manu & B.M. Mehtre
    Blind technique using blocking artifacts and entropy of histograms for image tampering detection
    Jiang, X., Arai, M. & Chen, G. (ed.)
    Second International Workshop on Pattern Recognition
    SPIE, 2017
    DOI: 10.1117/12.2280306
    BibTeX
    @inproceedings{Manu2017a,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Blind technique using blocking artifacts and entropy of histograms for image tampering detection},
     booktitle = {Second International Workshop on Pattern Recognition},
     publisher = {SPIE},
     year = {2017}}
    
  158. V.T. Manu & B.M. Mehtre
    Copy-move tampering detection using affine transformation property preservation on clustered keypoints
    Signal, Image and Video Processing, Springer, 2017, pp. 1
    DOI: 10.1007/s11760-017-1191-7
    BibTeX
    @article{Manu2017,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Copy-move tampering detection using affine transformation property preservation on clustered keypoints},
     journal = {Signal, Image and Video Processing},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  159. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    A deep learning approach for iris sensor model identification
    Pattern Recognition Letters, Elsevier BV, 2017
    DOI: 10.1016/j.patrec.2017.04.010
    BibTeX
    @article{Marra2017,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {A deep learning approach for iris sensor model identification},
     journal = {Pattern Recognition Letters},
     publisher = {Elsevier BV},
     year = {2017}}
    
  160. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Blind PRNU-Based Image Clustering for Source Identification
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2197-2211
    DOI: 10.1109/TIFS.2017.2701335
    BibTeX
    @article{Marra2017a,
     author = {Marra, F. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Blind PRNU-Based Image Clustering for Source Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {9},
     pages = {2197--2211}}
    
  161. K.A. Martire, G. Edmond, D.J. Navarro & B.R. Newell
    On the likelihood of “encapsulating all uncertainty”
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 76-79
    DOI: 10.1016/j.scijus.2016.10.004
    BibTeX
    @article{Martire2017,
     author = {Martire, Kristy A. and Edmond, Gary and Navarro, Daniel J. and Newell, Ben R.},
     title = {On the likelihood of “encapsulating all uncertainty”},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {76--79}}
    
  162. O. Mayer & M.C. Stamm
    Countering Anti-Forensics of Lateral Chromatic Aberration
    Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17
    ACM Press, 2017
    DOI: 10.1145/3082031.3083242
    BibTeX
    @inproceedings{Mayer2017,
     author = {Mayer, Owen and Stamm, Matthew C.},
     title = {Countering Anti-Forensics of Lateral Chromatic Aberration},
     booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17},
     publisher = {ACM Press},
     year = {2017}}
    
  163. A. Meenakshi Sundaram & C. Nandini
    ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics
    Software Engineering Trends and Techniques in Intelligent Systems, Springer, 2017
    DOI: 10.1007/978-3-319-57141-6_10
    BibTeX
    @article{MeenakshiSundaram2017,
     author = {Meenakshi Sundaram, A. and Nandini, C.},
     title = {ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics},
     journal = {Software Engineering Trends and Techniques in Intelligent Systems},
     publisher = {Springer},
     year = {2017}}
    
  164. S. Misra, M. Maheswaran & S. Hashmi
    Case Studies of Selected IoT Deployments
    Security Challenges and Approaches in Internet of Things, Springer, 2017
    DOI: 10.1007/978-3-319-44230-3_6
    BibTeX
    @article{Misra2017,
     author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman},
     title = {Case Studies of Selected IoT Deployments},
     journal = {Security Challenges and Approaches in Internet of Things},
     publisher = {Springer},
     year = {2017}}
    
  165. S. Misra, M. Maheswaran & S. Hashmi
    System Model for the Internet of Things
    Security Challenges and Approaches in Internet of Things, Springer, 2017
    DOI: 10.1007/978-3-319-44230-3_2
    BibTeX
    @article{Misra2017a,
     author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman},
     title = {System Model for the Internet of Things},
     journal = {Security Challenges and Approaches in Internet of Things},
     publisher = {Springer},
     year = {2017}}
    
  166. S. Misra, M. Maheswaran & S. Hashmi
    Vulnerable Features and Threats
    Security Challenges and Approaches in Internet of Things, Springer, 2017
    DOI: 10.1007/978-3-319-44230-3_3
    BibTeX
    @article{Misra2017b,
     author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman},
     title = {Vulnerable Features and Threats},
     journal = {Security Challenges and Approaches in Internet of Things},
     publisher = {Springer},
     year = {2017}}
    
  167. N.S. Monson & K.V.M. Kumar
    Behaviour knowledge space-based fusion for image forgery detection
    Proc. Int. Conf. Inventive Communication and Computational Technologies (ICICCT)
    2017, pp. 400-403
    DOI: 10.1109/ICICCT.2017.7975228
    BibTeX
    @inproceedings{Monson2017,
     author = {Monson, N. S. and Kumar, K. V. M.},
     title = {Behaviour knowledge space-based fusion for image forgery detection},
     booktitle = {Proc. Int. Conf. Inventive Communication and Computational Technologies (ICICCT)},
     year = {2017},
     pages = {400--403}}
    
  168. S.G. Muñoz
    Integridad En Imágenes de Dispositivos Móviles
    Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, 2017
    BibTeX
    @mastersthesis{Munoz2017,
     author = {Muñoz, Santiago Gómez},
     title = {Integridad En Imágenes de Dispositivos Móviles},
     school = {Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid},
     year = {2017}}
    
  169. S. Mushtaq & A.H. Mir
    Copy-Move forgery detection in images using grey-level run length matrix features
    International Journal of Forensic Engineering, Inderscience Publishers, 2017, Vol. 3(4), pp. 303
    DOI: 10.1504/ijfe.2017.087645
    BibTeX
    @article{Mushtaq2017,
     author = {Mushtaq, Saba and Mir, Ajaz Hussain},
     title = {Copy-Move forgery detection in images using grey-level run length matrix features},
     journal = {International Journal of Forensic Engineering},
     publisher = {Inderscience Publishers},
     year = {2017},
     volume = {3},
     number = {4},
     pages = {303}}
    
  170. G. Muzaffer, E.S. Karaagacli & G. Ulutas
    Recent keypoint based copy move forgery detection techniques
    Proc. Int. Artificial Intelligence and Data Processing Symp. (IDAP)
    2017, pp. 1-7
    DOI: 10.1109/IDAP.2017.8090251
    BibTeX
    @inproceedings{Muzaffer2017,
     author = {Muzaffer, G. and Karaagacli, E. S. and Ulutas, G.},
     title = {Recent keypoint based copy move forgery detection techniques},
     booktitle = {Proc. Int. Artificial Intelligence and Data Processing Symp. (IDAP)},
     year = {2017},
     pages = {1--7}}
    
  171. G. Muzaffer & G. Ulutas
    A fast and effective digital image copy move forgery detection with binarized SIFT
    Proc. 40th Int. Conf. Telecommunications and Signal Processing (TSP)
    2017, pp. 595-598
    DOI: 10.1109/TSP.2017.8076056
    BibTeX
    @inproceedings{Muzaffer2017b,
     author = {Muzaffer, G. and Ulutas, G.},
     title = {A fast and effective digital image copy move forgery detection with binarized SIFT},
     booktitle = {Proc. 40th Int. Conf. Telecommunications and Signal Processing (TSP)},
     year = {2017},
     pages = {595--598}}
    
  172. G. Muzaffer, G. Ulutaş & E. Gedikli
    PSO and SURF based digital image forgery detection
    Proc. Int. Conf. Computer Science and Engineering (UBMK)
    2017, pp. 688-692
    DOI: 10.1109/UBMK.2017.8093499
    BibTeX
    @inproceedings{Muzaffer2017a,
     author = {Muzaffer, G. and Ulutaş, G. and Gedikli, E.},
     title = {PSO and SURF based digital image forgery detection},
     booktitle = {Proc. Int. Conf. Computer Science and Engineering (UBMK)},
     year = {2017},
     pages = {688--692}}
    
  173. F.G.B.D. Natale & G. Boato
    Detecting morphological filtering of binary images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656472
    BibTeX
    @article{Natale2017,
     author = {Natale, F. G. B. De and Boato, G.},
     title = {Detecting morphological filtering of binary images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  174. M.N. Nazli & A.Y.A. Maghari
    Comparison between image forgery detection algorithms
    Proc. 8th Int. Conf. Information Technology (ICIT)
    2017, pp. 442-445
    DOI: 10.1109/ICITECH.2017.8080040
    BibTeX
    @inproceedings{Nazli2017,
     author = {Nazli, M. N. and Maghari, A. Y. A.},
     title = {Comparison between image forgery detection algorithms},
     booktitle = {Proc. 8th Int. Conf. Information Technology (ICIT)},
     year = {2017},
     pages = {442--445}}
    
  175. M.A. Nematollahi, C. Vorakulpipat & H.G. Rosales
    Preliminary on Watermarking Technology
    Digital Watermarking, Springer, 2017
    DOI: 10.1007/978-981-10-2095-7_1
    BibTeX
    @article{Nematollahi2017,
     author = {Nematollahi, Mohammad Ali and Vorakulpipat, Chalee and Rosales, Hamurabi Gamboa},
     title = {Preliminary on Watermarking Technology},
     journal = {Digital Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  176. T. Neubert
    Face Morphing Detection: An Approach Based on Image Degradation Analysis
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_8
    BibTeX
    @article{Neubert2017,
     author = {Neubert, Tom},
     title = {Face Morphing Detection: An Approach Based on Image Degradation Analysis},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  177. R.M.H. Nguyen & M.S. Brown
    RAW Image Reconstruction Using a Self-contained sRGB–JPEG Image with Small Memory Overhead
    International Journal of Computer Vision, Springer, 2017, pp. 1
    DOI: 10.1007/s11263-017-1056-0
    BibTeX
    @article{Nguyen2017,
     author = {Nguyen, Rang M. H. and Brown, Michael S.},
     title = {RAW Image Reconstruction Using a Self-contained sRGB–JPEG Image with Small Memory Overhead},
     journal = {International Journal of Computer Vision},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  178. J. Ni, C. Chen, Z. Shen & Y.Q. Shi
    Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications
    IEEE Transactions on Image Processing, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIP.2017.2682963
    BibTeX
    @article{Ni2017,
     author = {Ni, J. and Chen, C. and Shen, Z. and Shi, Y. Q.},
     title = {Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications},
     journal = {IEEE Transactions on Image Processing},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  179. S.J. Nightingale, K.A. Wade & D.G. Watson
    Can people identify original and manipulated photos of real-world scenes?
    Cognitive Research:Principles and Implications, 2017
    DOI: 10.1186/s41235-017-0067-2
    BibTeX
    @article{Nightingale2017,
     author = {Nightingale, Sophie J. and Wade, Kimerley A. and Watson, Derrick G.},
     title = {Can people identify original and manipulated photos of real-world scenes?},
     journal = {Cognitive Research:Principles and Implications},
     year = {2017}}
    
  180. Y. Niu, Y. Zhao & R. Ni
    Robust Median Filtering Detection based on Local Difference Descriptor
    Signal Processing: Image Communication, Elsevier BV, 2017
    DOI: 10.1016/j.image.2017.01.008
    BibTeX
    @article{Niu2017,
     author = {Niu, Yakun and Zhao, Yao and Ni, RongRong},
     title = {Robust Median Filtering Detection based on Local Difference Descriptor},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017}}
    
  181. Y.U.K.I. Obara, N.I.W.A. Yusuke & W.A.D.A. Shigeo
    Detection and Identification of Image Manipulation Based on Reversible Histogram Shift
    Electronics and Communications in Japan, Wiley-Blackwell, 2017, Vol. 100(9), pp. 13-22
    DOI: 10.1002/ecj.11973
    BibTeX
    @article{Obara2017,
     author = {Obara, Y. U. K. I. and Yusuke, N. I. W. A. and Shigeo, W. A. D. A.},
     title = {Detection and Identification of Image Manipulation Based on Reversible Histogram Shift},
     journal = {Electronics and Communications in Japan},
     publisher = {Wiley-Blackwell},
     year = {2017},
     volume = {100},
     number = {9},
     pages = {13--22}}
    
  182. V.K. Pandey, J. Singh & H. Parthasarathy
    Algebraic technique for computationally efficient Hahn moment invariants
    Multidimensional Systems and Signal Processing, Springer, 2017, pp. 1
    DOI: 10.1007/s11045-017-0516-6
    BibTeX
    @article{Pandey2017,
     author = {Pandey, Vishal Kumar and Singh, Jyotsna and Parthasarathy, Harish},
     title = {Algebraic technique for computationally efficient Hahn moment invariants},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  183. C.-S. Park & J.Y. Choeh
    Fast and robust copy-move forgery detection based on scale-space representation
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5248-y
    BibTeX
    @article{Park2017,
     author = {Park, Chun-Su and Choeh, Joon Yeon},
     title = {Fast and robust copy-move forgery detection based on scale-space representation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  184. C. Pasquini, G. Boato & F. Pérez-González
    Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 2890-2905
    DOI: 10.1109/TIFS.2017.2725201
    BibTeX
    @article{Pasquini2017,
     author = {Pasquini, C. and Boato, G. and Pérez-González, F.},
     title = {Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {12},
     pages = {2890--2905}}
    
  185. A. Peng, Y. Wu & X. Kang
    Revealing Traces of Image Resampling and Resampling Antiforensics
    Advances in Multimedia, 2017
    DOI: 10.1155/2017/7130491
    BibTeX
    @article{Peng2017,
     author = {Peng, Anjie and Wu, Yadong and Kang, Xiangui},
     title = {Revealing Traces of Image Resampling and Resampling Antiforensics},
     journal = {Advances in Multimedia},
     year = {2017}}
    
  186. B. Peng, W. Wang, J. Dong & T. Tan
    Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1813-1821
    DOI: 10.1109/CVPRW.2017.227
    BibTeX
    @inproceedings{Peng2017a,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1813--1821}}
    
  187. B. Peng, W. Wang, J. Dong & T. Tan
    Image Forensics Based on Planar Contact Constraints of 3D Objects
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2752728
    BibTeX
    @article{Peng2017b,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Image Forensics Based on Planar Contact Constraints of 3D Objects},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  188. B. Peng, W. Wang, J. Dong & T. Tan
    Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1813-1821
    DOI: 10.1109/CVPRW.2017.227
    BibTeX
    @inproceedings{Peng2017d,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1813--1821}}
    
  189. F. Peng, X.-h. Hu & M. Long
    Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces
    Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2017
    DOI: 10.1007/978-3-319-72389-1_30
    BibTeX
    @article{Peng2017c,
     author = {Peng, Fei and Hu, Xiao-hua and Long, Min},
     title = {Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces},
     journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage},
     publisher = {Springer},
     year = {2017}}
    
  190. Q.-T. Phan, G. Boato & F.G.B.D. Natale
    Image Clustering by Source Camera via Sparse Representation
    Proceedings of the 2nd International Workshop on Multimedia Forensics and Security - MFSec '17
    ACM Press, 2017
    DOI: 10.1145/3078897.3080532
    BibTeX
    @inproceedings{Phan2017,
     author = {Phan, Quoc-Tin and Boato, Giulia and Natale, Francesco G. B. De},
     title = {Image Clustering by Source Camera via Sparse Representation},
     booktitle = {Proceedings of the 2nd International Workshop on Multimedia Forensics and Security - MFSec '17},
     publisher = {ACM Press},
     year = {2017}}
    
  191. A. Pourkashani, A. Shahbahrami & B.A. Fomani
    Copy Move Forgery Detection Using Histogram Quantization of Cross Power Spectrum
    Proc. Int. Conf. High Performance Computing Simulation (HPCS)
    2017, pp. 826-831
    DOI: 10.1109/HPCS.2017.125
    BibTeX
    @inproceedings{Pourkashani2017,
     author = {Pourkashani, A. and Shahbahrami, A. and Fomani, B. A.},
     title = {Copy Move Forgery Detection Using Histogram Quantization of Cross Power Spectrum},
     booktitle = {Proc. Int. Conf. High Performance Computing Simulation (HPCS)},
     year = {2017},
     pages = {826--831}}
    
  192. C.S. Prakash, K.V. Anand & S. Maheshkar
    Detection of Copy-move Image Forgery Using Dct
    Advances in Computational Intelligence
    Springer, 2017
    DOI: 10.1007/978-981-10-2525-9_25
    BibTeX
    @incollection{Prakash2017,
     author = {Prakash, Choudhary Shyam and Anand, Kumar Vijay and Maheshkar, Sushila},
     title = {Detection of Copy-move Image Forgery Using Dct},
     booktitle = {Advances in Computational Intelligence},
     publisher = {Springer},
     year = {2017}}
    
  193. C.S. Prakash & S. Maheshkar
    Detection Algorithm for Copy-Move Forgery Based on Circle Block
    Proceedings of International Conference on Computer Vision and Image Processing, Springer, 2017
    DOI: 10.1007/978-981-10-2107-7_32
    BibTeX
    @article{Prakash2017a,
     author = {Prakash, Choudhary Shyam and Maheshkar, Sushila},
     title = {Detection Algorithm for Copy-Move Forgery Based on Circle Block},
     journal = {Proceedings of International Conference on Computer Vision and Image Processing},
     publisher = {Springer},
     year = {2017}}
    
  194. C.S. Prakash & S. Maheshkar
    Copy-Move Forgery Detection Using DyWT
    International Journal of Multimedia Data Engineering and Management (IJMDEM), IGI Global, 2017, Vol. 8(2), pp. 1-9
    BibTeX
    @article{Prakash2017b,
     author = {Prakash, Choudhary Shyam and Maheshkar, Sushila},
     title = {Copy-Move Forgery Detection Using DyWT},
     journal = {International Journal of Multimedia Data Engineering and Management (IJMDEM)},
     publisher = {IGI Global},
     year = {2017},
     volume = {8},
     number = {2},
     pages = {1--9}}
    
  195. T. Qiao, F. Retraint, R. Cogranne & T.H. Thai
    Individual camera device identification from JPEG images
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 52, pp. 74-86
    DOI: 10.1016/j.image.2016.12.011
    BibTeX
    @article{Qiao2017,
     author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai},
     title = {Individual camera device identification from JPEG images},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {52},
     pages = {74--86}}
    
  196. T. Qiao, A. Zhu & F. Retraint
    Exposing image resampling forgery by using linear parametric model
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4314-1
    BibTeX
    @article{Qiao2017a,
     author = {Qiao, Tong and Zhu, Aichun and Retraint, Florent},
     title = {Exposing image resampling forgery by using linear parametric model},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  197. S. Rahman & A. Robles-Kelly
    Estimating Reflectance Parameters, Light Direction, and Shape from a Single Multispectral Image
    IEEE Transactions on Computational Imaging, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TCI.2017.2717788
    BibTeX
    @article{Rahman2017,
     author = {Rahman, S. and Robles-Kelly, A.},
     title = {Estimating Reflectance Parameters, Light Direction, and Shape from a Single Multispectral Image},
     journal = {IEEE Transactions on Computational Imaging},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  198. N. Rahmouni, V. Nozick, J. Yamagishi & I. Echizen
    Distinguishing computer graphics from natural images using convolution neural networks
    Proc. IEEE Workshop Information Forensics and Security (WIFS)
    2017, pp. 1-6
    DOI: 10.1109/WIFS.2017.8267647
    BibTeX
    @inproceedings{Rahmouni2017,
     author = {Rahmouni, N. and Nozick, V. and Yamagishi, J. and Echizen, I.},
     title = {Distinguishing computer graphics from natural images using convolution neural networks},
     booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)},
     year = {2017},
     pages = {1--6}}
    
  199. B.S. Rao
    A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4426-2
    BibTeX
    @article{Rao2017,
     author = {Rao, B. Subrahmanyeswara},
     title = {A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  200. Q. Rao & J. Wang
    Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation
    IEEE Signal Processing Letters, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
    DOI: 10.1109/lsp.2017.2681426
    BibTeX
    @article{Rao2017a,
     author = {Rao, Qiang and Wang, Jianjun},
     title = {Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation},
     journal = {IEEE Signal Processing Letters},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     pages = {1--1}}
    
  201. Q. Rao & J. Wang
    Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation
    IEEE Signal Processing Letters, Institute of Electrical and Electronics Engineers (IEEE), 2017, Vol. 24(6), pp. 809-813
    DOI: 10.1109/LSP.2017.2681426
    BibTeX
    @article{Rao2017b,
     author = {Rao, Q. and Wang, J.},
     title = {Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation},
     journal = {IEEE Signal Processing Letters},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     volume = {24},
     number = {6},
     pages = {809--813}}
    
  202. M.R. Resmi & S. Vishnukumar
    A novel segmentation based copy-move forgery detection in digital images
    Proc. Int. Conf. Networks Advances in Computational Technologies (NetACT)
    2017, pp. 346-350
    DOI: 10.1109/NETACT.2017.8076793
    BibTeX
    @inproceedings{Resmi2017,
     author = {Resmi, M. R. and Vishnukumar, S.},
     title = {A novel segmentation based copy-move forgery detection in digital images},
     booktitle = {Proc. Int. Conf. Networks Advances in Computational Technologies (NetACT)},
     year = {2017},
     pages = {346--350}}
    
  203. H.K. Rhee
    Median filtering detection based on variations and residual in image forensics
    2017
    BibTeX
    @unpublished{Rhee2017,
     author = {Rhee, Hyeon Kang},
     title = {Median filtering detection based on variations and residual in image forensics},
     year = {2017}}
    
  204. K.H. Rhee
    Forgery image detection of Gaussian filtering by support vector machine using edge characteristics
    Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)
    2017, pp. 231-236
    DOI: 10.1109/ICUFN.2017.7993782
    BibTeX
    @inproceedings{Rhee2017a,
     author = {Rhee, K. H.},
     title = {Forgery image detection of Gaussian filtering by support vector machine using edge characteristics},
     booktitle = {Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)},
     year = {2017},
     pages = {231--236}}
    
  205. K.H. Rhee
    Forgery image detection of Gaussian filtering by support vector machine using edge characteristics
    Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)
    2017, pp. 231-236
    DOI: 10.1109/ICUFN.2017.7993782
    BibTeX
    @inproceedings{Rhee2017b,
     author = {Rhee, K. H.},
     title = {Forgery image detection of Gaussian filtering by support vector machine using edge characteristics},
     booktitle = {Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)},
     year = {2017},
     pages = {231--236}}
    
  206. K.H. Rhee
    Detection of JPEG Compression Anti-Forensics
    Journal of the Institute of Electronics and Information Engineers, 2017, Vol. 54(11)
    BibTeX
    @article{Rhee2017c,
     author = {Rhee, Kang Hyeon},
     title = {Detection of JPEG Compression Anti-Forensics},
     journal = {Journal of the Institute of Electronics and Information Engineers},
     year = {2017},
     volume = {54},
     number = {11}}
    
  207. I. Riad, A. Fadlil & T. Sari
    Image Forensic for detecting Splicing Image with Distance Function
    International Journal of Computer Applications, 2017, Vol. 169(5), pp. 6-10
    BibTeX
    @article{Riad2017,
     author = {Riad, Imam and Fadlil, Abdul and Sari, Titi},
     title = {Image Forensic for detecting Splicing Image with Distance Function},
     journal = {International Journal of Computer Applications},
     year = {2017},
     volume = {169},
     number = {5},
     pages = {6--10}}
    
  208. C. Riess
    Illumination Analysis in Physics-Based Image Forensics: A Joint Discussion of Illumination Direction and Color
    Digital Communication. Towards a Smart and Secure Future Internet
    Springer, 2017
    DOI: 10.1007/978-3-319-67639-5_9
    BibTeX
    @incollection{Riess2017a,
     author = {Riess, Christian},
     title = {Illumination Analysis in Physics-Based Image Forensics: A Joint Discussion of Illumination Direction and Color},
     booktitle = {Digital Communication. Towards a Smart and Secure Future Internet},
     publisher = {Springer},
     year = {2017}}
    
  209. C. Riess, M. Unberath, F. Naderi, S. Pfaller, M. Stamminger & E. Angelopoulou
    Handling multiple materials for exposure of digital forgeries using 2-D lighting environments
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(4), pp. 4747
    DOI: 10.1007/s11042-016-3655-0
    BibTeX
    @article{Riess2017,
     author = {Riess, Christian and Unberath, Mathias and Naderi, Farzad and Pfaller, Sven and Stamminger, Marc and Angelopoulou, Elli},
     title = {Handling multiple materials for exposure of digital forgeries using 2-D lighting environments},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {4},
     pages = {4747}}
    
  210. A. Roy, R.S. Chakraborty, U. Sameer & R. Naskar
    Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier
    Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2017, pp. 1848-1854
    DOI: 10.1109/CVPRW.2017.231
    BibTeX
    @inproceedings{Roy2017,
     author = {Roy, A. and Chakraborty, R. S. and Sameer, U. and Naskar, R.},
     title = {Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2017},
     pages = {1848--1854}}
    
  211. K. Sachdev, M. Kaur & S. Gupta
    A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints
    Proceeding of International Conference on Intelligent Communication, Control and Devices, Springer, 2017
    DOI: 10.1007/978-981-10-1708-7_91
    BibTeX
    @article{Sachdev2017,
     author = {Sachdev, Kanica and Kaur, Mandeep and Gupta, Savita},
     title = {A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints},
     journal = {Proceeding of International Conference on Intelligent Communication, Control and Devices},
     publisher = {Springer},
     year = {2017}}
    
  212. S. Sadeghi, S. Dadkhah, H.A. Jalab, G. Mazzola & D. Uliyan
    State of the art in passive digital image forgery detection: copy-move image forgery
    Pattern Analysis and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s10044-017-0678-8
    BibTeX
    @article{Sadeghi2017,
     author = {Sadeghi, Somayeh and Dadkhah, Sajjad and Jalab, Hamid A. and Mazzola, Giuseppe and Uliyan, Diaa},
     title = {State of the art in passive digital image forgery detection: copy-move image forgery},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  213. S. Saito, Y. Tomioka & H. Kitazawa
    A Theoretical Framework for Estimating False Acceptance Rate of PRNU-based Camera Identification
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
    DOI: 10.1109/tifs.2017.2692683
    BibTeX
    @article{Saito2017,
     author = {Saito, Shota and Tomioka, Yoichi and Kitazawa, Hitoshi},
     title = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-based Camera Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     pages = {1--1}}
    
  214. S. Saito, Y. Tomioka & H. Kitazawa
    A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2026-2035
    DOI: 10.1109/TIFS.2017.2692683
    BibTeX
    @article{Saito2017a,
     author = {Saito, S. and Tomioka, Y. and Kitazawa, H.},
     title = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {9},
     pages = {2026--2035}}
    
  215. R.N. Salimi
    Deteksi Copy-move Untuk Forensik Citra Dengan Modifikasi Algoritma Duplication Detection Dan Robust Detection
    Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya, Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya, 2017
    BibTeX
    @thesis{Salimi2017,
     author = {Salimi, Rahmat Nazali},
     title = {Deteksi Copy-move Untuk Forensik Citra Dengan Modifikasi Algoritma Duplication Detection Dan Robust Detection},
     school = {Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya},
     year = {2017}}
    
  216. R. Salloum, Y. Ren & C.C.J. Kuo
    Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)
    ArXiv, 2017
    BibTeX
    @article{Salloum2017,
     author = {Salloum, Ronald and Ren, Yuzhuo and Kuo, C. C. Jay},
     title = {Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)},
     journal = {ArXiv},
     year = {2017}}
    
  217. V.U. Sameer, R. Naskar, N. Musthyala & K. Kokkalla
    Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_5
    BibTeX
    @article{Sameer2017,
     author = {Sameer, Venkata Udaya and Naskar, Ruchira and Musthyala, Nikhita and Kokkalla, Kalyan},
     title = {Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  218. V. Schetinger, M. Iuliani, A. Piva & M.M. Oliveira
    Image Forgery Detection confronts Image Composition
    Computers & Graphics, Elsevier BV, 2017
    DOI: 10.1016/j.cag.2017.08.014
    BibTeX
    @article{Schetinger2017,
     author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.},
     title = {Image Forgery Detection confronts Image Composition},
     journal = {Computers & Graphics},
     publisher = {Elsevier BV},
     year = {2017}}
    
  219. C. Seibold, W. Samek, A. Hilsmann & P. Eisert
    Detection of Face Morphing Attacks by Deep Learning
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_9
    BibTeX
    @article{Seibold2017,
     author = {Seibold, Clemens and Samek, Wojciech and Hilsmann, Anna and Eisert, Peter},
     title = {Detection of Face Morphing Attacks by Deep Learning},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  220. Z.K. Senturk & D. Akgun
    Seam carving based image resizing detection using hybrid features
    Tehnicki vjesnik - Technical Gazette, Mechanical Engineering Faculty in Slavonski Brod, 2017, Vol. 24(6)
    DOI: 10.17559/tv-20160804121351
    BibTeX
    @article{Senturk2017,
     author = {Senturk, Zehra Karapinar and Akgun, Devrim},
     title = {Seam carving based image resizing detection using hybrid features},
     journal = {Tehnicki vjesnik - Technical Gazette},
     publisher = {Mechanical Engineering Faculty in Slavonski Brod},
     year = {2017},
     volume = {24},
     number = {6}}
    
  221. P.M. Shelke & R.S. Prasad
    Tradeoffs Between Forensics and Anti-Forensics of Digital Images
    International Journal of Rough Sets and Data Analysis, IGI Global, 2017, Vol. 4(2), pp. 92-105
    DOI: 10.4018/ijrsda.2017040107
    BibTeX
    @article{Shelke2017,
     author = {Shelke, Priya Makarand and Prasad, Rajesh Shardanand},
     title = {Tradeoffs Between Forensics and Anti-Forensics of Digital Images},
     journal = {International Journal of Rough Sets and Data Analysis},
     publisher = {IGI Global},
     year = {2017},
     volume = {4},
     number = {2},
     pages = {92--105}}
    
  222. M.M. Shetty & D.H. Manjaiah
    Challenges of Distributed Storage Systems in Internet of Things
    Internet of Things: Novel Advances and Envisioned Applications, Springer, 2017
    DOI: 10.1007/978-3-319-53472-5_9
    BibTeX
    @article{Shetty2017,
     author = {Shetty, Madhvaraj M. and Manjaiah, D. H.},
     title = {Challenges of Distributed Storage Systems in Internet of Things},
     journal = {Internet of Things: Novel Advances and Envisioned Applications},
     publisher = {Springer},
     year = {2017}}
    
  223. C. Shi, N.-F. Law, F.H.F. Leung & W.-C. Siu
    A local variance based approach to alleviate the scene content interference for source camera identification
    Digital Investigation, Elsevier BV, 2017
    DOI: 10.1016/j.diin.2017.07.005
    BibTeX
    @article{Shi2017a,
     author = {Shi, Chao and Law, Ngai-Fong and Leung, Frank H. F. and Siu, Wan-Chi},
     title = {A local variance based approach to alleviate the scene content interference for source camera identification},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  224. H.J. Shin, J.J. Jeon & I.K. Eom
    Bayer CFA pattern identification using color difference model
    Proc of the ICEIC 2017 International Conference on Electronics, Information, and Communication
    2017, pp. 187-188
    BibTeX
    @inproceedings{Shin2017,
     author = {Shin, Hyun Jun and Jeon, Jong Ju and Eom, Il Kyu},
     title = {Bayer CFA pattern identification using color difference model},
     booktitle = {Proc of the ICEIC 2017 International Conference on Electronics, Information, and Communication},
     year = {2017},
     pages = {187--188}}
    
  225. H.J. Shin, J.J. Jeon & I.K. Eom
    Color filter array pattern identification using variance of color difference image
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2017, Vol. 26(4), pp. 043015
    DOI: 10.1117/1.jei.26.4.043015
    BibTeX
    @article{Shin2017a,
     author = {Shin, Hyun Jun and Jeon, Jong Ju and Eom, Il Kyu},
     title = {Color filter array pattern identification using variance of color difference image},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2017},
     volume = {26},
     number = {4},
     pages = {043015}}
    
  226. N. Sidere, F. Cruz, M. Coustaty & J.M. Ogier
    A dataset for forgery detection and spotting in document images
    Proc. Seventh Int. Conf. Emerging Security Technologies (EST)
    2017, pp. 26-31
    DOI: 10.1109/EST.2017.8090394
    BibTeX
    @inproceedings{Sidere2017,
     author = {Sidere, N. and Cruz, F. and Coustaty, M. and Ogier, J. M.},
     title = {A dataset for forgery detection and spotting in document images},
     booktitle = {Proc. Seventh Int. Conf. Emerging Security Technologies (EST)},
     year = {2017},
     pages = {26--31}}
    
  227. G. Singh & K. Singh
    Improved JPEG anti-forensics with better image visual quality and forensic undetectability
    Forensic Science International, Elsevier BV, 2017, Vol. 277, pp. 133-147
    DOI: 10.1016/j.forsciint.2017.06.003
    BibTeX
    @article{Singh2017a,
     author = {Singh, Gurinder and Singh, Kulbir},
     title = {Improved JPEG anti-forensics with better image visual quality and forensic undetectability},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {277},
     pages = {133--147}}
    
  228. N. Singh, A. Gupta & R.C. Jain
    Global Contrast Enhancement Based Image Forensics Using Statistical Features
    Advances in Electrical and Electronic Engineering, VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences, 2017, Vol. 15(3)
    DOI: 10.15598/aeee.v15i3.2189
    BibTeX
    @article{Singh2017b,
     author = {Singh, Neetu and Gupta, Abhinav and Jain, Roop Chand},
     title = {Global Contrast Enhancement Based Image Forensics Using Statistical Features},
     journal = {Advances in Electrical and Electronic Engineering},
     publisher = {VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences},
     year = {2017},
     volume = {15},
     number = {3}}
    
  229. R.D. Singh & N. Aggarwal
    Video content authentication techniques: a comprehensive survey
    Multimedia Systems, Springer, 2017, pp. 1
    DOI: 10.1007/s00530-017-0538-9
    BibTeX
    @article{Singh2017,
     author = {Singh, Raahat Devender and Aggarwal, Naveen},
     title = {Video content authentication techniques: a comprehensive survey},
     journal = {Multimedia Systems},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  230. M. Sivarathinabala, S. Abirami & R. Baskaran
    A Study on Security and Surveillance System Using Gait Recognition
    Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
    DOI: 10.1007/978-3-319-44790-2_11
    BibTeX
    @article{Sivarathinabala2017,
     author = {Sivarathinabala, M. and Abirami, S. and Baskaran, R.},
     title = {A Study on Security and Surveillance System Using Gait Recognition},
     journal = {Intelligent Techniques in Signal Processing for Multimedia Security},
     publisher = {Springer},
     year = {2017}}
    
  231. C. Soize
    Random Matrix Models and Nonparametric Method for Uncertainty Quantification
    Handbook of Uncertainty Quantification, Springer, 2017
    DOI: 10.1007/978-3-319-12385-1_5
    BibTeX
    @article{Soize2017,
     author = {Soize, Christian},
     title = {Random Matrix Models and Nonparametric Method for Uncertainty Quantification},
     journal = {Handbook of Uncertainty Quantification},
     publisher = {Springer},
     year = {2017}}
    
  232. B. Soni, P.K. Das & D.M. Thounaojam
    Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature
    Proceedings of the 7th International Conference on Computer and Communication Technology - ICCCT-2017
    ACM Press, 2017
    DOI: 10.1145/3154979.3155001
    BibTeX
    @inproceedings{Soni2017,
     author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei},
     title = {Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature},
     booktitle = {Proceedings of the 7th International Conference on Computer and Communication Technology - ICCCT-2017},
     publisher = {ACM Press},
     year = {2017}}
    
  233. A.R. Soobhany, A.S. Akbari & Z.C. Schreuders
    Source Camera Identification Using Non-decimated Wavelet Transform
    11th International Conference on Global Security, Safety & Sustainability
    2017
    BibTeX
    @inproceedings{Soobhany2017,
     author = {Soobhany, A. Ryad and Akbari, A. Sheikh and Schreuders, Z. C.},
     title = {Source Camera Identification Using Non-decimated Wavelet Transform},
     booktitle = {11th International Conference on Global Security, Safety & Sustainability},
     year = {2017}}
    
  234. A.R. Soobhany, A. Sheikh Akbari & Z.C. Schreuders
    Reinforced source camera identification using non-decimated wavelet transform
    IET International Conference on Biomedical Image and Signal Processing, 2017
    BibTeX
    @article{Soobhany2017a,
     author = {Soobhany, A. R. and Sheikh Akbari, A. and Schreuders, Z. C.},
     title = {Reinforced source camera identification using non-decimated wavelet transform},
     journal = {IET International Conference on Biomedical Image and Signal Processing},
     year = {2017}}
    
  235. L. Su & C. Li
    A novel passive forgery detection algorithm for video region duplication
    Multidimensional Systems and Signal Processing, Springer Nature, 2017
    DOI: 10.1007/s11045-017-0496-6
    BibTeX
    @article{Su2017,
     author = {Su, Lichao and Li, Cuihua},
     title = {A novel passive forgery detection algorithm for video region duplication},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer Nature},
     year = {2017}}
    
  236. Y. Su, X. Jin, C. Zhang & Y. Chen
    Hierarchical Image Resampling Detection Based on Blind Deconvolution
    Journal of Visual Communication and Image Representation, Elsevier BV, 2017
    DOI: 10.1016/j.jvcir.2017.01.009
    BibTeX
    @article{Su2017a,
     author = {Su, Yuting and Jin, Xiao and Zhang, Chengqian and Chen, Yawei},
     title = {Hierarchical Image Resampling Detection Based on Blind Deconvolution},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  237. B. Subrahmanyeswara Rao
    A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4426-2
    BibTeX
    @article{SubrahmanyeswaraRao2017,
     author = {Subrahmanyeswara Rao, B.},
     title = {A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  238. D.B. Tariang, A. Roy, R.S. Chakraborty & R. Naskar
    Automated JPEG forgery detection with correlation based localization
    Proc. IEEE Int. Conf. Multimedia Expo Workshops (ICMEW)
    2017, pp. 226-231
    DOI: 10.1109/ICMEW.2017.8026326
    BibTeX
    @inproceedings{Tariang2017,
     author = {Tariang, D. B. and Roy, A. and Chakraborty, R. S. and Naskar, R.},
     title = {Automated JPEG forgery detection with correlation based localization},
     booktitle = {Proc. IEEE Int. Conf. Multimedia Expo Workshops (ICMEW)},
     year = {2017},
     pages = {226--231}}
    
  239. Tarman & H. Saini
    M-SIFT: A detection algorithm for copy move image forgery
    Proc. Computing and Control (ISPCC) 2017 4th Int. Conf. Signal Processing
    2017, pp. 425-430
    DOI: 10.1109/ISPCC.2017.8269716
    BibTeX
    @inproceedings{Tarman2017,
     author = {Tarman and Saini, H.},
     title = {M-SIFT: A detection algorithm for copy move image forgery},
     booktitle = {Proc. Computing and Control (ISPCC) 2017 4th Int. Conf. Signal Processing},
     year = {2017},
     pages = {425--430}}
    
  240. S. Taspinar, M. Mohanty & N. Memon
    PRNU-Based Camera Attribution From Multiple Seam-Carved Images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 3065-3080
    DOI: 10.1109/TIFS.2017.2737961
    BibTeX
    @article{Taspinar2017,
     author = {Taspinar, S. and Mohanty, M. and Memon, N.},
     title = {PRNU-Based Camera Attribution From Multiple Seam-Carved Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {12},
     pages = {3065--3080}}
    
  241. K. Taya, N. Takeda, T. Kobayashi, Y. Ozaki & N. Kuroki
    Detecting Doctored JPEG Image Based on Block Noise Analysis and Double JPEG Analysis
    IEEJ Transactions on Electronics, Information and Systems, Institute of Electrical Engineers of Japan (IEE Japan), 2017, Vol. 137(5), pp. 742-749
    DOI: 10.1541/ieejeiss.137.742
    BibTeX
    @article{Taya2017,
     author = {Taya, Kunihiko and Takeda, Naoto and Kobayashi, Tadashi and Ozaki, Yoshiaki and Kuroki, Nobutaka},
     title = {Detecting Doctored JPEG Image Based on Block Noise Analysis and Double JPEG Analysis},
     journal = {IEEJ Transactions on Electronics, Information and Systems},
     publisher = {Institute of Electrical Engineers of Japan (IEE Japan)},
     year = {2017},
     volume = {137},
     number = {5},
     pages = {742--749}}
    
  242. S. Teerakanok & T. Uehara
    Digital Media Tampering Detection Techniques: An Overview
    Proc. IEEE 41st Annual Computer Software and Applications Conf. (COMPSAC)
    2017, Vol. 2, pp. 170-174
    DOI: 10.1109/COMPSAC.2017.109
    BibTeX
    @inproceedings{Teerakanok2017,
     author = {Teerakanok, S. and Uehara, T.},
     title = {Digital Media Tampering Detection Techniques: An Overview},
     booktitle = {Proc. IEEE 41st Annual Computer Software and Applications Conf. (COMPSAC)},
     year = {2017},
     volume = {2},
     pages = {170--174}}
    
  243. A.U. Tembe & S.S. Thombre
    Survey of copy-paste forgery detection in digital image forensic
    Proc. Int. Conf. Innovative Mechanisms for Industry Applications (ICIMIA)
    2017, pp. 248-252
    DOI: 10.1109/ICIMIA.2017.7975613
    BibTeX
    @inproceedings{Tembe2017,
     author = {Tembe, A. U. and Thombre, S. S.},
     title = {Survey of copy-paste forgery detection in digital image forensic},
     booktitle = {Proc. Int. Conf. Innovative Mechanisms for Industry Applications (ICIMIA)},
     year = {2017},
     pages = {248--252}}
    
  244. D. Teyssou, J.-M. Leung, E. Apostolidis, K. Apostolidis, S. Papadopoulos, M. Zampoglou, O. Papadopoulou & V. Mezaris
    The InVID Plug-in: Web Video Verification on the Browser
    Proceedings of the 1st workshop on multimedia verification, 2017
    DOI: 10.1145/3132384.3132387
    BibTeX
    @article{Teyssou2017,
     author = {Teyssou, Denis and Leung, Jean-Michel and Apostolidis, Evlampios and Apostolidis, Konstantinos and Papadopoulos, Symeon and Zampoglou, Markos and Papadopoulou, Olga and Mezaris, Vasileios},
     title = {The InVID Plug-in: Web Video Verification on the Browser},
     journal = {Proceedings of the 1st workshop on multimedia verification},
     year = {2017}}
    
  245. T.H. Thai, R. Cogranne, F. Retraint & T.N.C. Doan
    JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(1), pp. 123-133
    DOI: 10.1109/TIFS.2016.2604208
    BibTeX
    @article{Thai2017,
     author = {Thai, T. H. and Cogranne, R. and Retraint, F. and Doan, T. N. C.},
     title = {JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {1},
     pages = {123--133}}
    
  246. T.H. Thai, R. Cogranne, F. Retraint & T.N.C. Doan
    JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(1), pp. 123-133
    DOI: 10.1109/TIFS.2016.2604208
    BibTeX
    @article{Thai2017a,
     author = {Thai, T. H. and Cogranne, R. and Retraint, F. and Doan, T. N. C.},
     title = {JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {1},
     pages = {123--133}}
    
  247. V. Thirunavukkarasu, J. Satheesh Kumar, G.S. Chae & J. Kishorkumar
    Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering
    Wireless Personal Communications, Springer, 2017, pp. 1
    DOI: 10.1007/s11277-016-3941-1
    BibTeX
    @article{Thirunavukkarasu2017,
     author = {Thirunavukkarasu, V. and Satheesh Kumar, J. and Chae, Gyoo Soo and Kishorkumar, J.},
     title = {Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering},
     journal = {Wireless Personal Communications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  248. N. Tian, B.W.-K. Ling, C. Qing & Z. Yang
    Camera identification based on very low bit rate videos with overall noise pattern having time varying statistics
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4323-0
    BibTeX
    @article{Tian2017,
     author = {Tian, Nili and Ling, Bingo Wing-Kuen and Qing, Chunmei and Yang, Zhijing},
     title = {Camera identification based on very low bit rate videos with overall noise pattern having time varying statistics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  249. M.H. Tirnaz & A. Bastan fard
    Identification of Manipulation in Digital Images through Hybrid Block-based and Key Points Algorithm
    QUID, 2017(28), pp. 78-92
    BibTeX
    @article{Tirnaz2017,
     author = {Tirnaz, Mohammad Hossein and Bastan fard, Azam},
     title = {Identification of Manipulation in Digital Images through Hybrid Block-based and Key Points Algorithm},
     journal = {QUID},
     year = {2017},
     number = {28},
     pages = {78--92}}
    
  250. H.K. Tu, L.T. Thuong, H.V.U. Synh, H.T. San & H.V. Khoa
    Develop an algorithm for image forensics using feature comparison and sharpness estimation
    Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing
    2017, pp. 82-87
    DOI: 10.1109/SIGTELCOM.2017.7849800
    BibTeX
    @inproceedings{Tu2017,
     author = {Tu, H. K. and Thuong, L. T. and Synh, H. V. U. and San, H. T. and Khoa, H. Van},
     title = {Develop an algorithm for image forensics using feature comparison and sharpness estimation},
     booktitle = {Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing},
     year = {2017},
     pages = {82--87}}
    
  251. H.K. Tu, L.T. Thuong, H.V.U. Synh, H.T. San & H.V. Khoa
    Develop an algorithm for image forensics using feature comparison and sharpness estimation
    Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing
    2017, pp. 82-87
    DOI: 10.1109/SIGTELCOM.2017.7849800
    BibTeX
    @inproceedings{Tu2017a,
     author = {Tu, H. K. and Thuong, L. T. and Synh, H. V. U. and San, H. T. and Khoa, H. Van},
     title = {Develop an algorithm for image forensics using feature comparison and sharpness estimation},
     booktitle = {Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing},
     year = {2017},
     pages = {82--87}}
    
  252. V. Tuba, R. Jovanovic & M. Tuba
    Digital image forgery detection based on shadow HSV inconsistency
    2017 5th International Symposium on Digital Forensic and Security (ISDFS)
    IEEE, 2017
    DOI: 10.1109/isdfs.2017.7916505
    BibTeX
    @inproceedings{Tuba2017,
     author = {Tuba, Viktor and Jovanovic, Raka and Tuba, Milan},
     title = {Digital image forgery detection based on shadow HSV inconsistency},
     booktitle = {2017 5th International Symposium on Digital Forensic and Security (ISDFS)},
     publisher = {IEEE},
     year = {2017}}
    
  253. D.M. Uliyan, H.A. Jalab, A. Abuarqoub & M. Abu-Hashem
    Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor
    Proceedings of the International Conference on Future Networks and Distributed Systems
    ACM, 2017, pp. 6:1-6:6
    DOI: 10.1145/3102304.3102310
    BibTeX
    @inproceedings{Uliyan2017,
     author = {Uliyan, Diaa M. and Jalab, Hamid A. and Abuarqoub, Abdelrahman and Abu-Hashem, Muhannad},
     title = {Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor},
     booktitle = {Proceedings of the International Conference on Future Networks and Distributed Systems},
     publisher = {ACM},
     year = {2017},
     pages = {6:1--6:6}}
    
  254. G. Ulutas, A. Ustubioglu, B. Ustubioglu, V. Nabiyev & M. Ulutas
    Medical Image Tamper Detection Based on Passive Image Authentication
    Journal of Digital Imaging, Springer, 2017, pp. 1
    DOI: 10.1007/s10278-017-9961-x
    BibTeX
    @article{Ulutas2017,
     author = {Ulutas, Guzin and Ustubioglu, Arda and Ustubioglu, Beste and Nabiyev, Vasif and Ulutas, Mustafa},
     title = {Medical Image Tamper Detection Based on Passive Image Authentication},
     journal = {Journal of Digital Imaging},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  255. B. Üstübioğlu, G. Ulutaş, V.V. Nabiyev, M. Ulutaş & A. Üstübioğlu
    A fast detection method for frame duplication forgery based on correlation
    Proc. 25th Signal Processing and Communications Applications Conf. (SIU)
    2017, pp. 1-4
    DOI: 10.1109/SIU.2017.7960530
    BibTeX
    @inproceedings{Uestuebioglu2017,
     author = {Üstübioğlu, B. and Ulutaş, G. and Nabiyev, V. V. and Ulutaş, M. and Üstübioğlu, A.},
     title = {A fast detection method for frame duplication forgery based on correlation},
     booktitle = {Proc. 25th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2017},
     pages = {1--4}}
    
  256. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    User Authentication via PRNU-Based Physical Unclonable Functions
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(8), pp. 1941-1956
    DOI: 10.1109/TIFS.2017.2697402
    BibTeX
    @article{Valsesia2017a,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {User Authentication via PRNU-Based Physical Unclonable Functions},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {8},
     pages = {1941--1956}}
    
  257. D. Valsesia, G. Coluccia, T. Bianchi & E. MagliValsesia
    User Authentication via PRNU-based Physical Unclonable Functions
    IEEE Transactions on Information, 2017
    BibTeX
    @article{Valsesia2017,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and MagliValsesia, E.},
     title = {User Authentication via PRNU-based Physical Unclonable Functions},
     journal = {IEEE Transactions on Information},
     year = {2017}}
    
  258. D. Vázquez-Padín, F. Pérez-González & P. Comesaña-Alfaro
    Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling
    arXiv, 2017
    BibTeX
    @article{Vazquez-Padin2017,
     author = {Vázquez-Padín, David and Pérez-González, Fernando and Comesaña-Alfaro, Pedro},
     title = {Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling},
     journal = {arXiv},
     year = {2017}}
    
  259. D. Vázquez-Padín, F. Pérez-González & P. Comesaña-Alfaro
    A Random Matrix Approach to the Forensic Analysis of Upscaled Images
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2017, Vol. 12(9), pp. 1-1
    DOI: 10.1109/tifs.2017.2699638
    BibTeX
    @article{Vazquez-Padin2017a,
     author = {Vázquez-Padín, D. and Pérez-González, F. and Comesaña-Alfaro, P.},
     title = {A Random Matrix Approach to the Forensic Analysis of Upscaled Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     volume = {12},
     number = {9},
     pages = {1--1}}
    
  260. D. Vázquez-Padín, F. Pérez-González & P. Comesaña-Alfaro
    Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling
    Digital Communication. Towards a Smart and Secure Future Internet
    Springer, 2017
    DOI: 10.1007/978-3-319-67639-5_10
    BibTeX
    @incollection{Vazquez-Padin2017b,
     author = {Vázquez-Padín, David and Pérez-González, Fernando and Comesaña-Alfaro, Pedro},
     title = {Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling},
     booktitle = {Digital Communication. Towards a Smart and Secure Future Internet},
     publisher = {Springer},
     year = {2017}}
    
  261. U.S. Venkata, R. Naskar, N. Musthyala & K. Kokkalla
    Deep Learning based Counter-Forensic Image Classification for Camera Model Identification
    Proc of the International Workshop on Digital Forensics and Watermarking (IWDW), Madgeburg, Germany, 23-25 August 2017
    2017
    BibTeX
    @conference{Venkata2017,
     author = {Venkata, Udaya Sameer and Naskar, Ruchira and Musthyala, Nikhita and Kokkalla, Kalyan},
     title = {Deep Learning based Counter-Forensic Image Classification for Camera Model Identification},
     booktitle = {Proc of the International Workshop on Digital Forensics and Watermarking (IWDW), Madgeburg, Germany, 23-25 August 2017},
     year = {2017}}
    
  262. V. Verma, N. Agarwal & N. Khanna
    DCT-domain Deep Convolutional Neural Networks for Multiple JPEG Compression Classification
    ArXiv, 2017
    BibTeX
    @article{Verma2017,
     author = {Verma, Vinay and Agarwal, Nikita and Khanna, Nitin},
     title = {DCT-domain Deep Convolutional Neural Networks for Multiple JPEG Compression Classification},
     journal = {ArXiv},
     year = {2017}}
    
  263. D.S. Vidyadharan & S.M. Thampi
    Detecting Spliced Face Using Texture Analysis
    Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2017
    DOI: 10.1007/978-3-319-72395-2_72
    BibTeX
    @article{Vidyadharan2017,
     author = {Vidyadharan, Divya S. and Thampi, Sabu M.},
     title = {Detecting Spliced Face Using Texture Analysis},
     journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage},
     publisher = {Springer},
     year = {2017}}
    
  264. T. Vijayanandh & A. Shenbagavalli
    Tamper detection of medical images using statistical moments against various attacks
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-5473-4
    BibTeX
    @article{Vijayanandh2017,
     author = {Vijayanandh, T. and Shenbagavalli, A.},
     title = {Tamper detection of medical images using statistical moments against various attacks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  265. J. Waleed, T.M. Hasan & T. Abbas
    Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image
    Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)
    2017, pp. 156-161
    DOI: 10.1109/NTICT.2017.7976108
    BibTeX
    @inproceedings{Waleed2017,
     author = {Waleed, J. and Hasan, T. M. and Abbas, T.},
     title = {Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image},
     booktitle = {Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)},
     year = {2017},
     pages = {156--161}}
    
  266. J. Waleed, T.M. Hasan & T. Abbas
    Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image
    Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)
    2017, pp. 156-161
    DOI: 10.1109/NTICT.2017.7976108
    BibTeX
    @inproceedings{Waleed2017a,
     author = {Waleed, J. and Hasan, T. M. and Abbas, T.},
     title = {Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image},
     booktitle = {Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)},
     year = {2017},
     pages = {156--161}}
    
  267. Q. Wan, K. Panetta & S. Agaian
    A video forensic technique for detecting frame integrity using human visual system-inspired measure
    Proc. IEEE Int. Symp. Technologies for Homeland Security (HST)
    2017, pp. 1-6
    DOI: 10.1109/THS.2017.7943466
    BibTeX
    @inproceedings{Wan2017,
     author = {Wan, Q. and Panetta, K. and Agaian, S.},
     title = {A video forensic technique for detecting frame integrity using human visual system-inspired measure},
     booktitle = {Proc. IEEE Int. Symp. Technologies for Homeland Security (HST)},
     year = {2017},
     pages = {1--6}}
    
  268. C.-C.C. Wang & Han
    Robust Copy-move Forgery Detection through Invariant Moment Features
    The Fifth International Conference on Informatics & Applications (ICIA 2016)
    2017
    BibTeX
    @conference{Wang2017c,
     author = {Wang, Chien-Chang Chen and Han},
     title = {Robust Copy-move Forgery Detection through Invariant Moment Features},
     booktitle = {The Fifth International Conference on Informatics & Applications (ICIA 2016)},
     year = {2017}}
    
  269. K. Wang
    A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens
    2017
    BibTeX
    @unpublished{Wang2017,
     author = {Wang, Kai},
     title = {A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens},
     year = {2017}}
    
  270. R. Wang, W. Lu, S. Xiang, X. Zhao & J. Wang
    Digital image splicing detection based on Markov features in QDCT and QWT domain
    ArXiv, 2017
    BibTeX
    @article{Wang2017b,
     author = {Wang, Ruxin and Lu, Wei and Xiang, Shijun and Zhao, Xianfeng and Wang, Jinwei},
     title = {Digital image splicing detection based on Markov features in QDCT and QWT domain},
     journal = {ArXiv},
     year = {2017}}
    
  271. W. Wang, F. Liu, T. Guo & Y. Ren
    Temporal Integration Based Visual Cryptography Scheme and Its Application
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_30
    BibTeX
    @article{Wang2017a,
     author = {Wang, Wen and Liu, Feng and Guo, Teng and Ren, Yawei},
     title = {Temporal Integration Based Visual Cryptography Scheme and Its Application},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  272. Y. Wang, L. Tian & C. Li
    LBP-SVD Based Copy Move Forgery Detection Algorithm
    Proc. IEEE Int. Symp. Multimedia (ISM)
    2017, pp. 553-556
    DOI: 10.1109/ISM.2017.108
    BibTeX
    @inproceedings{Wang2017f,
     author = {Wang, Y. and Tian, L. and Li, C.},
     title = {LBP-SVD Based Copy Move Forgery Detection Algorithm},
     booktitle = {Proc. IEEE Int. Symp. Multimedia (ISM)},
     year = {2017},
     pages = {553--556}}
    
  273. Z.F. Wang, L. Zhu, Q.S. Min & C.Y. Zeng
    Double compression detection based on feature fusion
    Proc. Int. Conf. Machine Learning and Cybernetics (ICMLC)
    2017, Vol. 2, pp. 379-384
    DOI: 10.1109/ICMLC.2017.8108951
    BibTeX
    @inproceedings{Wang2017d,
     author = {Wang, Z. F. and Zhu, L. and Min, Q. S. and Zeng, C. Y.},
     title = {Double compression detection based on feature fusion},
     booktitle = {Proc. Int. Conf. Machine Learning and Cybernetics (ICMLC)},
     year = {2017},
     volume = {2},
     pages = {379--384}}
    
  274. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    A scale invariant digital image copy-paste forgery detection approach based on NCC
    International Journal of Computer Applications, 2017
    BibTeX
    @article{Warbhe2017,
     author = {Warbhe, Anil Dada and Dharaskar, Rajiv V. and Thakare, Vilas M.},
     title = {A scale invariant digital image copy-paste forgery detection approach based on NCC},
     journal = {International Journal of Computer Applications},
     year = {2017}}
    
  275. W.T. Weldtsadik, H.J. Kim, Y. Choi & C. Kim
    Circle Block Based Copy-Move Forgery Detection
    Yoon, K. & Kim, C. G. (ed.)
    Proceedings of the 3rd EEECS 2017 Okinawa Jichikaikan Okinawa Pref. Municipal Center, Japan January 9-11, 2017
    2017
    BibTeX
    @inproceedings{Weldtsadik2017,
     author = {Weldtsadik, Wendimagegn Tariku and Kim, Hyoung Joog and Choi, Yongsoo and Kim, Cheongghil},
     title = {Circle Block Based Copy-Move Forgery Detection},
     booktitle = {Proceedings of the 3rd EEECS 2017 Okinawa Jichikaikan Okinawa Pref. Municipal Center, Japan January 9-11, 2017},
     year = {2017}}
    
  276. L. Wen, H. Qi & S. Lyu
    Contrast Enhancement Estimation for Digital Image Forensics
    ArXiv, 2017
    BibTeX
    @article{Wen2017a,
     author = {Wen, Longyin and Qi, Honggang and Lyu, Siwei},
     title = {Contrast Enhancement Estimation for Digital Image Forensics},
     journal = {ArXiv},
     year = {2017}}
    
  277. W. Wen & S. Khatibi
    Estimation of Image Sensor Fill Factor Using a Single Arbitrary Image
    Sensors, MDPI AG, 2017, Vol. 17(3), pp. 620
    DOI: 10.3390/s17030620
    BibTeX
    @article{Wen2017,
     author = {Wen, Wei and Khatibi, Siamak},
     title = {Estimation of Image Sensor Fill Factor Using a Single Arbitrary Image},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2017},
     volume = {17},
     number = {3},
     pages = {620}}
    
  278. Y. Wo, K. Yang, G. Han, H. Chen & W. Wu
    Copy --move forgery detection based on multi-radius PCET
    IET Image Proc, 2017, Vol. 11(2), pp. 99-108
    DOI: 10.1049/iet-ipr.2016.0229
    BibTeX
    @article{Wo2017,
     author = {Wo, Y. and Yang, K. and Han, G. and Chen, H. and Wu, W.},
     title = {Copy --move forgery detection based on multi-radius PCET},
     journal = {IET Image Proc},
     year = {2017},
     volume = {11},
     number = {2},
     pages = {99--108}}
    
  279. H.-T. Wu, S. Tang & Y.-Q. Shi
    Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_22
    BibTeX
    @article{Wu2017a,
     author = {Wu, Hao-Tian and Tang, Shaohua and Shi, Yun-Qing},
     title = {Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  280. M.-L. Wu, C.-S. Fahn & Y.-F. Chen
    Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks
    Applied Intelligence, Springer, 2017, pp. 1
    DOI: 10.1007/s10489-017-0893-4
    BibTeX
    @article{Wu2017,
     author = {Wu, Meng-Luen and Fahn, Chin-Shyurng and Chen, Yi-Fan},
     title = {Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks},
     journal = {Applied Intelligence},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  281. W. Xing, S. Zhao & S. Zhang
    Blind Identification Technology of Computer Generated Image Based on Texture Recognition
    Journal of Computational and Theoretical Nanoscience, American Scientific Publishers, 2017, Vol. 14(7), pp. 3312-3322
    DOI: 10.1166/jctn.2017.6628
    BibTeX
    @article{Xing2017,
     author = {Xing, Weiwei and Zhao, Shibo and Zhang, Shunli},
     title = {Blind Identification Technology of Computer Generated Image Based on Texture Recognition},
     journal = {Journal of Computational and Theoretical Nanoscience},
     publisher = {American Scientific Publishers},
     year = {2017},
     volume = {14},
     number = {7},
     pages = {3312--3322}}
    
  282. Q. Xu, T. Sun, X. Jiang & Y. Dong
    HEVC Double Compression Detection Based on SN-PUPM Feature
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_1
    BibTeX
    @article{Xu2017,
     author = {Xu, Qianyi and Sun, Tanfeng and Jiang, Xinghao and Dong, Yi},
     title = {HEVC Double Compression Detection Based on SN-PUPM Feature},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  283. J. Yaduwanshi & P. Bansal
    A Novel Approach for Copy Move Forgery Detection Using Template Matching
    Proceedings of International Conference on Communication and Networks, Springer, 2017
    DOI: 10.1007/978-981-10-2750-5_72
    BibTeX
    @article{Yaduwanshi2017,
     author = {Yaduwanshi, Jyoti and Bansal, Pratosh},
     title = {A Novel Approach for Copy Move Forgery Detection Using Template Matching},
     journal = {Proceedings of International Conference on Communication and Networks},
     publisher = {Springer},
     year = {2017}}
    
  284. J. Yan
    Novel Security and Privacy Perspectives of Camera Fingerprints
    Security Protocols XXIV, Springer, 2017
    DOI: 10.1007/978-3-319-62033-6_11
    BibTeX
    @article{Yan2017,
     author = {Yan, Jeff},
     title = {Novel Security and Privacy Perspectives of Camera Fingerprints},
     journal = {Security Protocols XXIV},
     publisher = {Springer},
     year = {2017}}
    
  285. J. Yan
    Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)
    Security Protocols XXIV, Springer, 2017
    DOI: 10.1007/978-3-319-62033-6_12
    BibTeX
    @article{Yan2017a,
     author = {Yan, Jeff},
     title = {Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)},
     journal = {Security Protocols XXIV},
     publisher = {Springer},
     year = {2017}}
    
  286. B. Yang, Z. Li, W. Hu & E. Cao
    A Median Filtering Forensics Approach Based on Machine Learning
    Cloud Computing and Security, Springer, 2017
    DOI: 10.1007/978-3-319-68542-7_44
    BibTeX
    @article{Yang2017i,
     author = {Yang, Bin and Li, Zhenyu and Hu, Weifeng and Cao, Enguo},
     title = {A Median Filtering Forensics Approach Based on Machine Learning},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2017}}
    
  287. B. Yang, X. Qiu, W. Hu, H. Guo & C. Song
    Exposing Copy-move Forgery Based on Improved Sift Descriptor
    Journal of Internet Technology, 2017, Vol. 18(2), pp. 417-425
    BibTeX
    @article{Yang2017c,
     author = {Yang, Bin and Qiu, Xiaolin and Hu, Weifeng and Guo, Honglei and Song, Chunlin},
     title = {Exposing Copy-move Forgery Based on Improved Sift Descriptor},
     journal = {Journal of Internet Technology},
     year = {2017},
     volume = {18},
     number = {2},
     pages = {417--425}}
    
  288. B. Yang, X. Sun, H. Guo, Z. Xia & X. Chen
    A copy-move forgery detection method based on CMFD-SIFT
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4289-y
    BibTeX
    @article{Yang2017,
     author = {Yang, Bin and Sun, Xingming and Guo, Honglei and Xia, Zhihua and Chen, Xianyi},
     title = {A copy-move forgery detection method based on CMFD-SIFT},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  289. F. Yang, J. Li, W. Lu & J. Weng
    Copy-move forgery detection based on hybrid features
    Engineering Applications of Artificial Intelligence, Elsevier BV, 2017, Vol. 59, pp. 73-83
    DOI: 10.1016/j.engappai.2016.12.022
    BibTeX
    @article{Yang2017a,
     author = {Yang, Fan and Li, Jingwei and Lu, Wei and Weng, Jian},
     title = {Copy-move forgery detection based on hybrid features},
     journal = {Engineering Applications of Artificial Intelligence},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {59},
     pages = {73--83}}
    
  290. G. Yang, W. Qi, X. Li & Z. Guo
    Improved Reversible Visible Watermarking Based on Adaptive Block Partition
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_23
    BibTeX
    @article{Yang2017f,
     author = {Yang, Guangyuan and Qi, Wenfa and Li, Xiaolong and Guo, Zongming},
     title = {Improved Reversible Visible Watermarking Based on Adaptive Block Partition},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  291. H.-y. Yang, Y. Niu, L.-x. Jiao, Y.-n. Liu, X.-y. Wang & Z.-l. Zhou
    Robust copy-move forgery detection based on multi-granularity Superpixels matching
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4978-1
    BibTeX
    @article{Yang2017g,
     author = {Yang, Hong-ying and Niu, Ying and Jiao, Li-xian and Liu, Yu-nan and Wang, Xiang-yang and Zhou, Zhi-li},
     title = {Robust copy-move forgery detection based on multi-granularity Superpixels matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  292. J. Yang, H. Ren, G. Zhu, J. Huang & Y.-Q. Shi
    Detecting median filtering via two-dimensional AR models of multiple filtered residuals
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4691-0
    BibTeX
    @article{Yang2017d,
     author = {Yang, Jianquan and Ren, Honglei and Zhu, Guopu and Huang, Jiwu and Shi, Yun-Qing},
     title = {Detecting median filtering via two-dimensional AR models of multiple filtered residuals},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  293. P. Yang, R. Li, R. Ni & Y. Zhao
    Recaptured Image Forensics Based on Quality Aware and Histogram Feature
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_3
    BibTeX
    @article{Yang2017e,
     author = {Yang, Pengpeng and Li, Ruihan and Ni, Rongrong and Zhao, Yao},
     title = {Recaptured Image Forensics Based on Quality Aware and Histogram Feature},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  294. P. Yang, R. Ni, Y. Zhao & W. Zhao
    Source camera identification based on content-adaptive fusion residual networks
    Pattern Recognition Letters, Elsevier BV, 2017
    DOI: 10.1016/j.patrec.2017.10.016
    BibTeX
    @article{Yang2017h,
     author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Zhao, Wei},
     title = {Source camera identification based on content-adaptive fusion residual networks},
     journal = {Pattern Recognition Letters},
     publisher = {Elsevier BV},
     year = {2017}}
    
  295. P. Yang, W. Zhao, R. Ni & Y. Zhao
    Source Camera Identification Based On Content-Adaptive Fusion Network
    arXiv, 2017
    BibTeX
    @article{Yang2017b,
     author = {Yang, Pengpeng and Zhao, Wei and Ni, Rongrong and Zhao, Yao},
     title = {Source Camera Identification Based On Content-Adaptive Fusion Network},
     journal = {arXiv},
     year = {2017}}
    
  296. H. Yao, F. Cao, Z. Tang, J. Wang & T. Qiao
    Expose noise level inconsistency incorporating the inhomogeneity scoring strategy
    Multimedia Tools and Applications, Springer Nature, 2017
    DOI: 10.1007/s11042-017-5206-8
    BibTeX
    @article{Yao2017,
     author = {Yao, Heng and Cao, Fang and Tang, Zhenjun and Wang, Jinwei and Qiao, Tong},
     title = {Expose noise level inconsistency incorporating the inhomogeneity scoring strategy},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2017}}
    
  297. J. Ye & Y.-Q. Shi
    A Hybrid Feature Model for Seam Carving Detection
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_7
    BibTeX
    @article{Ye2017,
     author = {Ye, Jingyu and Shi, Yun-Qing},
     title = {A Hybrid Feature Model for Seam Carving Detection},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  298. K. Ye, J. Dong, W. Wang, J. Xu & T. Tan
    Image Forgery Detection Based on Semantic Image Understanding
    Communications in Computer and Information Science
    Springer Singapore, 2017, pp. 472-481
    DOI: 10.1007/978-981-10-7299-4_39
    BibTeX
    @incollection{Ye2017b,
     author = {Ye, Kui and Dong, Jing and Wang, Wei and Xu, Jindong and Tan, Tieniu},
     title = {Image Forgery Detection Based on Semantic Image Understanding},
     booktitle = {Communications in Computer and Information Science},
     publisher = {Springer Singapore},
     year = {2017},
     pages = {472--481}}
    
  299. K. Ye, X. Sun, J. Xu, J. Dong & T. Tan
    Influence Evaluation for Image Tampering Using Saliency Mechanism
    Communications in Computer and Information Science
    Springer Singapore, 2017, pp. 518-527
    DOI: 10.1007/978-981-10-7299-4_43
    BibTeX
    @incollection{Ye2017a,
     author = {Ye, Kui and Sun, Xiaobo and Xu, Jindong and Dong, Jing and Tan, Tieniu},
     title = {Influence Evaluation for Image Tampering Using Saliency Mechanism},
     booktitle = {Communications in Computer and Information Science},
     publisher = {Springer Singapore},
     year = {2017},
     pages = {518--527}}
    
  300. M. Zakariah, M.K. Khan & H. Malik
    Digital multimedia audio forensics: past, present and future
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4277-2
    BibTeX
    @article{Zakariah2017,
     author = {Zakariah, Mohammed and Khan, Muhammad Khurram and Malik, Hafiz},
     title = {Digital multimedia audio forensics: past, present and future},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  301. M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris & J. Spangenberg
    A Web-Based Service for Disturbing Image Detection
    MultiMedia Modeling, Springer, 2017
    DOI: 10.1007/978-3-319-51814-5_37
    BibTeX
    @article{Zampoglou2017a,
     author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis and Spangenberg, Jochen},
     title = {A Web-Based Service for Disturbing Image Detection},
     journal = {MultiMedia Modeling},
     publisher = {Springer},
     year = {2017}}
    
  302. F. Zeng, W. Wang, J. Chen & M. Tang
    Detecting blurred image splicing using blur type inconsistency
    International Journal of Innovative Computing and Applications, Inderscience Publishers, 2017, Vol. 8(1), pp. 31
    DOI: 10.1504/ijica.2017.082495
    BibTeX
    @article{Zeng2017,
     author = {Zeng, Feng and Wang, Wei and Chen, Junjie and Tang, Min},
     title = {Detecting blurred image splicing using blur type inconsistency},
     journal = {International Journal of Innovative Computing and Applications},
     publisher = {Inderscience Publishers},
     year = {2017},
     volume = {8},
     number = {1},
     pages = {31}}
    
  303. H. Zeng, J. Yu, X. Kang & S. Lyu
    Countering JPEG anti-forensics based on noise level estimation
    Science China Information Sciences, Springer Nature, 2017, Vol. 61(3)
    DOI: 10.1007/s11432-016-0426-1
    BibTeX
    @article{Zeng2017a,
     author = {Zeng, Hui and Yu, Jingjing and Kang, Xiangui and Lyu, Siwei},
     title = {Countering JPEG anti-forensics based on noise level estimation},
     journal = {Science China Information Sciences},
     publisher = {Springer Nature},
     year = {2017},
     volume = {61},
     number = {3}}
    
  304. Y. Zhan, Y. Chen, Q. Zhang & X. Kang
    Image Forensics Based on Transfer Learning and Convolutional Neural Network
    Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec 17
    ACM Press, 2017
    DOI: 10.1145/3082031.3083250
    BibTeX
    @inproceedings{Zhan2017,
     author = {Zhan, Yifeng and Chen, Yifang and Zhang, Qiong and Kang, Xiangui},
     title = {Image Forensics Based on Transfer Learning and Convolutional Neural Network},
     booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec 17},
     publisher = {ACM Press},
     year = {2017}}
    
  305. D. Zhang, Q. Li, G. Yang, L. Li & X. Sun
    Detection of image seam carving by using weber local descriptor and local binary patterns
    Journal of Information Security and Applications, Elsevier BV, 2017, Vol. 36, pp. 135-144
    DOI: 10.1016/j.jisa.2017.09.003
    BibTeX
    @article{Zhang2017e,
     author = {Zhang, Dengyong and Li, Qingguo and Yang, Gaobo and Li, Leida and Sun, Xingming},
     title = {Detection of image seam carving by using weber local descriptor and local binary patterns},
     journal = {Journal of Information Security and Applications},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {36},
     pages = {135--144}}
    
  306. D. Zhang, Z. Liang, G. Yang, Q. Li, L. Li & X. Sun
    A robust forgery detection algorithm for object removal by exemplar-based image inpainting
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4829-0
    BibTeX
    @article{Zhang2017c,
     author = {Zhang, Dengyong and Liang, Zaoshan and Yang, Gaobo and Li, Qingguo and Li, Leida and Sun, Xingming},
     title = {A robust forgery detection algorithm for object removal by exemplar-based image inpainting},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  307. D. Zhang, T. Yin, G. Yang, M. Xia, L. Li & X. Sun
    Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies
    Journal of Visual Communication and Image Representation, Elsevier BV, 2017, Vol. 48, pp. 281-291
    DOI: 10.1016/j.jvcir.2017.07.006
    BibTeX
    @article{Zhang2017b,
     author = {Zhang, Dengyong and Yin, Ting and Yang, Gaobo and Xia, Ming and Li, Leida and Sun, Xingming},
     title = {Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {48},
     pages = {281--291}}
    
  308. L.-B. Zhang, F. Peng & M. Long
    Source Camera Identification Based on Guided Image Estimation and Block Weighted Average
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_8
    BibTeX
    @article{Zhang2017,
     author = {Zhang, Le-Bing and Peng, Fei and Long, Min},
     title = {Source Camera Identification Based on Guided Image Estimation and Block Weighted Average},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  309. W. Zhang, Z. Yang, S. Niu & J. Wang
    Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_12
    BibTeX
    @article{Zhang2017a,
     author = {Zhang, Weiwei and Yang, Zhenghong and Niu, Shaozhang and Wang, Junbin},
     title = {Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  310. Y. Zhang & V.L.L. Thing
    A multi-scale noise-resistant feature adaptation approach for image tampering localization over Facebook
    Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
    2017, pp. 272-276
    DOI: 10.1109/SIPROCESS.2017.8124547
    BibTeX
    @inproceedings{Zhang2017f,
     author = {Zhang, Y. and Thing, V. L. L.},
     title = {A multi-scale noise-resistant feature adaptation approach for image tampering localization over Facebook},
     booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)},
     year = {2017},
     pages = {272--276}}
    
  311. Y. Zhang, L. Zheng & V.L.L. Thing
    Automated face swapping and its detection
    Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
    2017, pp. 15-19
    DOI: 10.1109/SIPROCESS.2017.8124497
    BibTeX
    @inproceedings{Zhang2017g,
     author = {Zhang, Y. and Zheng, L. and Thing, V. L. L.},
     title = {Automated face swapping and its detection},
     booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)},
     year = {2017},
     pages = {15--19}}
    
  312. Z. Zhang, D. Wang, C. Wang & X. Zhou
    Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors
    KSII Transactions on Internet and Information Systems, Korean Society for Internet Information (KSII), 2017, Vol. 11(9)
    DOI: 10.3837/tiis.2017.09.021
    BibTeX
    @article{Zhang2017d,
     author = {Zhang, Zhi and Wang, Dongyan and Wang, Chengyou and Zhou, Xiao},
     title = {Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors},
     journal = {KSII Transactions on Internet and Information Systems},
     publisher = {Korean Society for Internet Information (KSII)},
     year = {2017},
     volume = {11},
     number = {9}}
    
  313. F. Zhao, W. Shi, B. Qin & B. Liang
    Image forgery detection using segmentation and swarm intelligent algorithm
    Wuhan University Journal of Natural Sciences, Springer, 2017, Vol. 22(2), pp. 141
    DOI: 10.1007/s11859-017-1227-4
    BibTeX
    @article{Zhao2017,
     author = {Zhao, Fei and Shi, Wenchang and Qin, Bo and Liang, Bin},
     title = {Image forgery detection using segmentation and swarm intelligent algorithm},
     journal = {Wuhan University Journal of Natural Sciences},
     publisher = {Springer},
     year = {2017},
     volume = {22},
     number = {2},
     pages = {141}}
    
  314. J. Zhong, Y. Gan, J. Young, L. Huang & P. Lin
    A new block-based method for copy move forgery detection under image geometric transforms
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(13), pp. 14887
    DOI: 10.1007/s11042-016-4201-9
    BibTeX
    @article{Zhong2017,
     author = {Zhong, Junliu and Gan, Yanfen and Young, Janson and Huang, Lian and Lin, Peiyu},
     title = {A new block-based method for copy move forgery detection under image geometric transforms},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {13},
     pages = {14887}}
    
  315. J. Zhou, J. Ni & Y. Rao
    Block-Based Convolutional Neural Network for Image Forgery Detection
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-64185-0_6
    BibTeX
    @article{Zhou2017,
     author = {Zhou, Jianghong and Ni, Jiangqun and Rao, Yuan},
     title = {Block-Based Convolutional Neural Network for Image Forgery Detection},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  316. Y. Zhu, T.T. Ng, B. Wen, X. Shen & B. Li
    Copy-move forgery detection in the presence of similar but genuine objects
    Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
    2017, pp. 25-29
    DOI: 10.1109/SIPROCESS.2017.8124499
    BibTeX
    @inproceedings{Zhu2017,
     author = {Zhu, Y. and Ng, T. T. and Wen, B. and Shen, X. and Li, B.},
     title = {Copy-move forgery detection in the presence of similar but genuine objects},
     booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)},
     year = {2017},
     pages = {25--29}}
    
  317. А.А. Варламова & А.В. Кузнецов
    Image Splicing Localization Based on CFA-artifacts Analysis
    Компьютерная оптика, 2017
    BibTeX
    @article{Варламова2017,
     author = {Варламова, Анна Александровна and Кузнецов, Андрей Владимирович},
     title = {Image Splicing Localization Based on CFA-artifacts Analysis},
     journal = {Компьютерная оптика},
     year = {2017}}
    
  318. Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Lecture Notes in Computer Science)
    Shi, Y. Q., Kim, H. J., Perez-Gonzalez & F., Liu, F. (ed.)
    Springer, 2017
    BibTeX
    @book{Shi2017,,
     title = {Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Lecture Notes in Computer Science)},
     publisher = {Springer},
     year = {2017}}
    


2016

  1. O.M. Al-Qershi & B.E. Khoo
    Information Science and Applications (ICIsa) 2016
    Kim, J. K. & Joukov, N. (ed.)
    Lecture Notes in Electrical Engineering
    Chapter Copy-Move Forgery Detection Using on Locality Sensitive Hashing and k-means Clustering
    Springer Singapore, 2016, pp. 663-672
    DOI: 10.1007/978-981-10-0557-2_65
    BibTeX
    @inbook{Al-Qershi2016,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Information Science and Applications (ICIsa) 2016},
     booktitle = {Lecture Notes in Electrical Engineering},
     publisher = {Springer Singapore},
     year = {2016},
     pages = {663--672}}
    
  2. J. Abbasi Aghamaleki & A. Behrad
    Malicious Inter-frame Video Tampering Detection in Mpeg Videos Using Time and Spatial Domain Analysis of Quantization Effects
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4004-z
    BibTeX
    @article{AbbasiAghamaleki2016,
     author = {Abbasi Aghamaleki, Javad and Behrad, Alireza},
     title = {Malicious Inter-frame Video Tampering Detection in Mpeg Videos Using Time and Spatial Domain Analysis of Quantization Effects},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  3. S. Abramova & R. Böhme
    Detecting Copy--move Forgeries in Scanned Text Documents
    Digital-Forensics and Watermarking
    Springer Science + Business Media, 2016, pp. 3-18
    DOI: 10.1007/978-3-662-43886-2_1
    BibTeX
    @incollection{Abramova2016,
     author = {Abramova, Svetlana and Böhme, Rainer},
     title = {Detecting Copy--move Forgeries in Scanned Text Documents},
     booktitle = {Digital-Forensics and Watermarking},
     publisher = {Springer Science + Business Media},
     year = {2016},
     pages = {3--18}}
    
  4. N. Afshin, F. Razzazi & M.S. Moin
    A Dictionary Based Approach to JPEG Anti-forensics
    Proc. IEEE 8th Int. Conf. Intelligent Systems (IS)
    2016, pp. 778-783
    DOI: 10.1109/IS.2016.7737401
    BibTeX
    @inproceedings{Afshin2016,
     author = {Afshin, N. and Razzazi, F. and Moin, M. S.},
     title = {A Dictionary Based Approach to JPEG Anti-forensics},
     booktitle = {Proc. IEEE 8th Int. Conf. Intelligent Systems (IS)},
     year = {2016},
     pages = {778--783}}
    
  5. S. Agarwal & S. Chand
    Texture Operator Based Image Splicing Detection Hybrid Technique
    Proc. Second Int. Conf. Computational Intelligence Communication Technology (CICT)
    2016, pp. 116-120
    DOI: 10.1109/CICT.2016.31
    BibTeX
    @inproceedings{Agarwal2016,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Texture Operator Based Image Splicing Detection Hybrid Technique},
     booktitle = {Proc. Second Int. Conf. Computational Intelligence Communication Technology (CICT)},
     year = {2016},
     pages = {116--120}}
    
  6. S. Agarwal & S. Chand
    Image tampering detection using local phase based operator
    Proc. Int. Conf. Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES)
    2016, pp. 355-360
    DOI: 10.1109/ICETEESES.2016.7581409
    BibTeX
    @inproceedings{Agarwal2016a,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image tampering detection using local phase based operator},
     booktitle = {Proc. Int. Conf. Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES)},
     year = {2016},
     pages = {355--360}}
    
  7. V. Agarwal & V. Mane
    Reflective SIFT for improving the detection of copy-move image forgery
    Proc. Second Int. Conf. Research in Computational Intelligence and Communication Networks (ICRCICN)
    2016, pp. 84-88
    DOI: 10.1109/ICRCICN.2016.7813636
    BibTeX
    @inproceedings{Agarwal2016b,
     author = {Agarwal, V. and Mane, V.},
     title = {Reflective SIFT for improving the detection of copy-move image forgery},
     booktitle = {Proc. Second Int. Conf. Research in Computational Intelligence and Communication Networks (ICRCICN)},
     year = {2016},
     pages = {84--88}}
    
  8. Z. Akhtar & E. Khan
    Identifying High Quality JPEG Compressed Images through Exhaustive Recompression Technique
    Proc. Communications and Informatics (ICACCI) 2016 Int. Conf. Advances in Computing
    2016, pp. 652-656
    DOI: 10.1109/ICACCI.2016.7732120
    BibTeX
    @inproceedings{Akhtar2016,
     author = {Akhtar, Z. and Khan, E.},
     title = {Identifying High Quality JPEG Compressed Images through Exhaustive Recompression Technique},
     booktitle = {Proc. Communications and Informatics (ICACCI) 2016 Int. Conf. Advances in Computing},
     year = {2016},
     pages = {652--656}}
    
  9. K.R. Akshatha, H. Anitha, A.K. Karunakar, U. Raghavendra & D. Shetty
    Source Camera Identification Using Noise Residual
    Proc. of the International conference on Recent Trends in Electronics, Information & Communication Technology, 20/05/2016, SVCE Bangalore
    2016
    BibTeX
    @inproceedings{Akshatha2016,
     author = {Akshatha, K. R. and Anitha, H. and Karunakar, A. K. and Raghavendra, U. and Shetty, Dinesh},
     title = {Source Camera Identification Using Noise Residual},
     booktitle = {Proc. of the International conference on Recent Trends in Electronics, Information & Communication Technology, 20/05/2016, SVCE Bangalore},
     year = {2016}}
    
  10. K.R. Akshatha, A.K. Karunakar, H. Anitha, U. Raghavendra & D. Shetty
    Digital Camera Identification Using PRNU: A Feature Based Approach
    Digital Investigation, Elsevier BV, 2016
    DOI: 10.1016/j.diin.2016.10.002
    BibTeX
    @article{Akshatha2016a,
     author = {Akshatha, K. R. and Karunakar, A. K. and Anitha, H. and Raghavendra, U. and Shetty, Dinesh},
     title = {Digital Camera Identification Using PRNU: A Feature Based Approach},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  11. A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, G. Bebis & H. Mathkour
    Passive Detection of Image Forgery Using DCT and Local Binary Pattern
    Signal, Image and Video Processing, 2016, pp. 1-8
    DOI: 10.1007/s11760-016-0899-0
    BibTeX
    @article{Alahmadi2016,
     author = {Alahmadi, Amani and Hussain, Muhammad and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George and Mathkour, Hassan},
     title = {Passive Detection of Image Forgery Using DCT and Local Binary Pattern},
     journal = {Signal, Image and Video Processing},
     year = {2016},
     pages = {1--8}}
    
  12. L. Alamro & N. Yusoff
    Copy-move Forgery Detection in Digital Image
    AIP Conference Proceedings, 2016, Vol. 1761(1)
    DOI: 10.1063/1.4960855
    BibTeX
    @article{Alamro2016,
     author = {Alamro, Loai and Yusoff, Nooraini},
     title = {Copy-move Forgery Detection in Digital Image},
     journal = {AIP Conference Proceedings},
     year = {2016},
     volume = {1761},
     number = {1}}
    
  13. M. Al-Ani & F. Khelifi
    On the Sensor Pattern Noise Estimation in Image Forensics: A Systematic Empirical Evaluation
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2640938
    BibTeX
    @article{Al-Ani2016,
     author = {Al-Ani, M. and Khelifi, F.},
     title = {On the Sensor Pattern Noise Estimation in Image Forensics: A Systematic Empirical Evaluation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  14. M.M. Al-Hammadi & S. Emmanuel
    Improving SURF Based Copy-Move Forgery Detection Using Super Resolution
    Proc. IEEE Int. Symp. Multimedia (ISM)
    2016, pp. 341-344
    DOI: 10.1109/ISM.2016.0075
    BibTeX
    @inproceedings{Al-Hammadi2016,
     author = {Al-Hammadi, M. M. and Emmanuel, S.},
     title = {Improving SURF Based Copy-Move Forgery Detection Using Super Resolution},
     booktitle = {Proc. IEEE Int. Symp. Multimedia (ISM)},
     year = {2016},
     pages = {341--344}}
    
  15. M. Alhussein
    Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine
    Proc. UKSim-AMSS 18th Int. Conf. Computer Modelling and Simulation (UKSim)
    2016, pp. 196-199
    DOI: 10.1109/UKSim.2016.39
    BibTeX
    @inproceedings{Alhussein2016,
     author = {Alhussein, M.},
     title = {Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine},
     booktitle = {Proc. UKSim-AMSS 18th Int. Conf. Computer Modelling and Simulation (UKSim)},
     year = {2016},
     pages = {196--199}}
    
  16. M.H. Alkawaz, G. Sulong, T. Saba & A. Rehman
    Detection of copy-move image forgery based on discrete cosine transform
    Neural Computing and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s00521-016-2663-3
    BibTeX
    @article{Alkawaz2016,
     author = {Alkawaz, Mohammed Hazim and Sulong, Ghazali and Saba, Tanzila and Rehman, Amjad},
     title = {Detection of copy-move image forgery based on discrete cosine transform},
     journal = {Neural Computing and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  17. M. Almeida, P.L. Correia & P.K. Larsen
    Biofov -- an Open Platform for Forensic Video Analysis and Biometric Data Extraction
    Proc. 4th Int. Conf. Biometrics and Forensics (IWBF)
    2016, pp. 1-6
    DOI: 10.1109/IWBF.2016.7449693
    BibTeX
    @inproceedings{Almeida2016,
     author = {Almeida, M. and Correia, P. L. and Larsen, P. K.},
     title = {Biofov -- an Open Platform for Forensic Video Analysis and Biometric Data Extraction},
     booktitle = {Proc. 4th Int. Conf. Biometrics and Forensics (IWBF)},
     year = {2016},
     pages = {1--6}}
    
  18. O.M. Al-Qershi & B.E. Khoo
    Copy-move Forgery Detection Using on Locality Sensitive Hashing and K-means Clustering
    Information Science and Applications (ICISA) 2016
    Springer, 2016
    DOI: 10.1007/978-981-10-0557-2_65
    BibTeX
    @incollection{Al-Qershi2016b,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Copy-move Forgery Detection Using on Locality Sensitive Hashing and K-means Clustering},
     booktitle = {Information Science and Applications (ICISA) 2016},
     publisher = {Springer},
     year = {2016}}
    
  19. I. Amerini, R. Becarelli, F. Brancati, R. Caldelli, G. Giunta & M.L. Itria
    Media Trustworthiness Verification and Event Assessment through an Integrated Framework: A Case-study
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3303-8
    BibTeX
    @article{Amerini2016,
     author = {Amerini, Irene and Becarelli, Rudy and Brancati, Francesco and Caldelli, Roberto and Giunta, Gabriele and Itria, Massimiliano L.},
     title = {Media Trustworthiness Verification and Event Assessment through an Integrated Framework: A Case-study},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  20. S. Amneet
    Feature Development Based on CFA Artifacts for Image Forgery Detection
    Thapar University, Thapar University, 2016
    BibTeX
    @mastersthesis{Amneet2016,
     author = {Amneet, Singh},
     title = {Feature Development Based on CFA Artifacts for Image Forgery Detection},
     school = {Thapar University},
     year = {2016}}
    
  21. B. Anderson-Sackaney & A. Abdel-Dayem
    Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification
    International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016, Vol. 10(12)
    BibTeX
    @article{Anderson-Sackaney2016,
     author = {Anderson-Sackaney, Benjamin and Abdel-Dayem, Amr},
     title = {Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification},
     journal = {International Journal of Computer, Electrical, Automation, Control and Information Engineering},
     year = {2016},
     volume = {10},
     number = {12}}
    
  22. K. Asghar, Z. Habib & M. Hussain
    Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review
    Australian Journal of Forensic Sciences, 2016, Vol. 0(0), pp. 1-27
    DOI: 10.1080/00450618.2016.1153711
    BibTeX
    @article{Asghar2016,
     author = {Asghar, Khurshid and Habib, Zulfiqar and Hussain, Muhammad},
     title = {Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review},
     journal = {Australian Journal of Forensic Sciences},
     year = {2016},
     volume = {0},
     number = {0},
     pages = {1--27}}
    
  23. S. Aymaz, Ş. Aymaz & G. Ulutaş
    Detection of copy move forgery using Legendre Moments
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 1125-1128
    DOI: 10.1109/SIU.2016.7495942
    BibTeX
    @inproceedings{Aymaz2016,
     author = {Aymaz, S. and Aymaz, Ş. and Ulutaş, G.},
     title = {Detection of copy move forgery using Legendre Moments},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {1125--1128}}
    
  24. S. Azarian-Pour, M. Babaie-Zadeh & A.R. Sadri
    An automatic JPEG ghost detection approach for digital image forensics
    Proc. 24th Iranian Conf. Electrical Engineering (ICEE)
    2016, pp. 1645-1649
    DOI: 10.1109/IranianCEE.2016.7585785
    BibTeX
    @inproceedings{Azarian-Pour2016,
     author = {Azarian-Pour, S. and Babaie-Zadeh, M. and Sadri, A. R.},
     title = {An automatic JPEG ghost detection approach for digital image forensics},
     booktitle = {Proc. 24th Iranian Conf. Electrical Engineering (ICEE)},
     year = {2016},
     pages = {1645--1649}}
    
  25. S. Azarian-Pour, M. Babaie-Zadeh & A.R. Sadri
    An automatic JPEG ghost detection approach for digital image forensics
    Proc. 24th Iranian Conf. Electrical Engineering (ICEE)
    2016, pp. 1645-1649
    DOI: 10.1109/IranianCEE.2016.7585785
    BibTeX
    @inproceedings{Azarian-Pour2016a,
     author = {Azarian-Pour, S. and Babaie-Zadeh, M. and Sadri, A. R.},
     title = {An automatic JPEG ghost detection approach for digital image forensics},
     booktitle = {Proc. 24th Iranian Conf. Electrical Engineering (ICEE)},
     year = {2016},
     pages = {1645--1649}}
    
  26. M.A. Bagiwa, A.W.A. Wahab, M.Y.I. Idris, S. Khan & K.-K.R. Choo
    Chroma Key Background Detection for Digital Video Using Statistical Correlation of Blurring Artifact
    Digital Investigation, Elsevier BV, 2016, Vol. 19, pp. 29-43
    DOI: 10.1016/j.diin.2016.09.001
    BibTeX
    @article{Bagiwa2016,
     author = {Bagiwa, Mustapha Aminu and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna and Khan, Suleman and Choo, Kim-Kwang Raymond},
     title = {Chroma Key Background Detection for Digital Video Using Statistical Correlation of Blurring Artifact},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {19},
     pages = {29--43}}
    
  27. Bansal
    A novel Analysis of Image Forgery Detection Using SVM
    2016
    BibTeX
    @article{Bansal2016,
     author = {Bansal},
     title = {A novel Analysis of Image Forgery Detection Using SVM},
     year = {2016}}
    
  28. M. Barni, Z. Chen & B. Tondi
    Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823902
    BibTeX
    @inproceedings{Barni2016,
     author = {Barni, M. and Chen, Z. and Tondi, B.},
     title = {Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  29. L. Baroffio, L. Bondi, P. Bestagini & S. Tubaro
    Camera Identification with Deep Convolutional Networks
    arXiv preprint arXiv:1603.01068, 2016
    DOI: 10.1016/j.image.2016.05.007
    BibTeX
    @article{Baroffio2016,
     author = {Baroffio, Luca and Bondi, Luca and Bestagini, Paolo and Tubaro, Stefano},
     title = {Camera Identification with Deep Convolutional Networks},
     journal = {arXiv preprint arXiv:1603.01068},
     year = {2016}}
    
  30. A. Baumy, N.F. Soiliman, M. Abdalla & F.A. El-Samie
    A Discriminative Statistical Model for Digital Image Forgery Detection
    I.J. Engineering and Manufacturing, 2016
    DOI: 10.5815/ijem.
    BibTeX
    @article{Baumy2016,
     author = {Baumy, Amira and Soiliman, Naglaa. F. and Abdalla, Mahmoud and El-Samie, Fathi Abd},
     title = {A Discriminative Statistical Model for Digital Image Forgery Detection},
     journal = {I.J. Engineering and Manufacturing},
     year = {2016}}
    
  31. B. Bayar & M.C. Stamm
    A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
    Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
    ACM, 2016, pp. 5-10
    DOI: 10.1145/2909827.2930786
    BibTeX
    @inproceedings{Bayar2016,
     author = {Bayar, Belhassen and Stamm, Matthew C.},
     title = {A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer},
     booktitle = {Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security},
     publisher = {ACM},
     year = {2016},
     pages = {5--10}}
    
  32. E. Baykal, B. Ustubioglu & G. Ulutas
    Image forgery detection based on SIFT and k-means++
    Proc. 39th Int. Conf. Telecommunications and Signal Processing (TSP)
    2016, pp. 474-477
    DOI: 10.1109/TSP.2016.7760924
    BibTeX
    @inproceedings{Baykal2016,
     author = {Baykal, E. and Ustubioglu, B. and Ulutas, G.},
     title = {Image forgery detection based on SIFT and k-means++},
     booktitle = {Proc. 39th Int. Conf. Telecommunications and Signal Processing (TSP)},
     year = {2016},
     pages = {474--477}}
    
  33. C.E.H. Berger & K. Slooten
    The LR does not exist
    Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 388-391
    DOI: 10.1016/j.scijus.2016.06.005
    BibTeX
    @article{Berger2016,
     author = {Berger, Charles E. H. and Slooten, Klaas},
     title = {The LR does not exist},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {56},
     number = {5},
     pages = {388--391}}
    
  34. F. Bertini, R. Sharma, A. Iannı, D. Montesi & M.A. Zamboni
    Social Media Investigations Using Shared Photos
    2016
    DOI: 10.1145/2790755.2790765
    BibTeX
    @electronic{Bertini2016,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannı, Andrea and Montesi, Danilo and Zamboni, Mura Anteo},
     title = {Social Media Investigations Using Shared Photos},
     year = {2016}}
    
  35. P. Bestagini, S. Milani, M. Tagliasacchi & S. Tubaro
    Codec and Gop Identification in Double Compressed Videos
    IEEE Transactions on Image Processing, 2016, Vol. 25(5), pp. 2298-2310
    DOI: 10.1109/TIP.2016.2541960
    BibTeX
    @article{Bestagini2016,
     author = {Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Codec and Gop Identification in Double Compressed Videos},
     journal = {IEEE Transactions on Image Processing},
     year = {2016},
     volume = {25},
     number = {5},
     pages = {2298--2310}}
    
  36. P. Bestagini, M. Tagliasacchi & S. Tubaro
    Image Phylogeny Tree Reconstruction Based on Region Selection
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2059-2063
    DOI: 10.1109/ICASSP.2016.7472039
    BibTeX
    @inproceedings{Bestagini2016a,
     author = {Bestagini, P. and Tagliasacchi, M. and Tubaro, S.},
     title = {Image Phylogeny Tree Reconstruction Based on Region Selection},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2059--2063}}
    
  37. A. Bharati, R. Singh, M. Vatsa & K. Bowyer
    Detecting Facial Retouching Using Supervised Deep Learning
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIFS.2016.2561898
    BibTeX
    @article{Bharati2016,
     author = {Bharati, A. and Singh, R. and Vatsa, M. and Bowyer, K.},
     title = {Detecting Facial Retouching Using Supervised Deep Learning},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  38. C.N. Bharti & P. Tandel
    A Survey of Image Forgery Detection Techniques
    Proc. Signal Processing and Networking (WiSPNET) 2016 Int. Conf. Wireless Communications
    2016, pp. 877-881
    DOI: 10.1109/WiSPNET.2016.7566257
    BibTeX
    @inproceedings{Bharti2016,
     author = {Bharti, C. N. and Tandel, P.},
     title = {A Survey of Image Forgery Detection Techniques},
     booktitle = {Proc. Signal Processing and Networking (WiSPNET) 2016 Int. Conf. Wireless Communications},
     year = {2016},
     pages = {877--881}}
    
  39. G. Bhartiya & A.S. Jalal
    Forgery Detection Using Feature-clustering in Recompressed JPEG Images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3964-3
    BibTeX
    @article{Bhartiya2016,
     author = {Bhartiya, Gunjan and Jalal, Anand Singh},
     title = {Forgery Detection Using Feature-clustering in Recompressed JPEG Images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  40. X. Bi, C.M. Pun & X.C. Yuan
    Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2016, pp. 952-956
    DOI: 10.1109/TrustCom.2016.0161
    BibTeX
    @inproceedings{Bi2016a,
     author = {Bi, X. and Pun, C. M. and Yuan, X. C.},
     title = {Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2016},
     pages = {952--956}}
    
  41. X. Bi, C.-M. Pun & X.-C. Yuan
    Multi-scale feature extraction and adaptive matching for copy-move forgery detection
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4276-3
    BibTeX
    @article{Bi2016,
     author = {Bi, XiuLi and Pun, Chi-Man and Yuan, Xiao-Chen},
     title = {Multi-scale feature extraction and adaptive matching for copy-move forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  42. A. Biedermann, S. Bozza, F. Taroni & C. Aitken
    Reframing the debate: A question of probability, not of likelihood ratio
    Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 392-396
    DOI: 10.1016/j.scijus.2016.05.008
    BibTeX
    @article{Biedermann2016,
     author = {Biedermann, A. and Bozza, S. and Taroni, F. and Aitken, C.},
     title = {Reframing the debate: A question of probability, not of likelihood ratio},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {56},
     number = {5},
     pages = {392--396}}
    
  43. V.A. Binson, N.M. Thomas, S. Thoams, A. Augustine & K.S. Sivakumar
    An advance to cloning detection in digital forensics investigations
    Proc. Int. Conf. Emerging Technological Trends (ICETT)
    2016, pp. 1-5
    DOI: 10.1109/ICETT.2016.7873743
    BibTeX
    @inproceedings{Binson2016,
     author = {Binson, V. A. and Thomas, N. M. and Thoams, S. and Augustine, A. and Sivakumar, K. S.},
     title = {An advance to cloning detection in digital forensics investigations},
     booktitle = {Proc. Int. Conf. Emerging Technological Trends (ICETT)},
     year = {2016},
     pages = {1--5}}
    
  44. G.K. Birajdar & V.H. Mankar
    Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier
    Satapathy, C. S., Joshi, A., Modi, N. & Pathak, N. (ed.)
    Proceedings of International Conference on ICT for Sustainable Development
    Chapter Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier
    Springer Singapore, 2016, pp. 447-455
    DOI: 10.1007/978-981-10-0129-1_47
    BibTeX
    @inbook{Birajdar2016,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier},
     booktitle = {Proceedings of International Conference on ICT for Sustainable Development},
     publisher = {Springer Singapore},
     year = {2016},
     pages = {447--455}}
    
  45. P.M. Birajdar & N.G. Dharashive
    Digital Image Forgery Identification Using Motion Blur Variations as Clue
    KHOJ – Journal of Indian Management Research and Practices, 2016
    BibTeX
    @article{Birajdar2016a,
     author = {Birajdar, P. M. and Dharashive, N. G.},
     title = {Digital Image Forgery Identification Using Motion Blur Variations as Clue},
     journal = {KHOJ – Journal of Indian Management Research and Practices},
     year = {2016}}
    
  46. R. Böhme & M. Kirchner
    Media Forensics
    Information Hiding
    Chapter Chapter 9
    Artech House - Boston, 2016, pp. 231259
    BibTeX
    @inbook{Boehme2016,
     author = {Böhme, Rainer and Kirchner, Matthias},
     title = {Media Forensics},
     booktitle = {Information Hiding},
     publisher = {Artech House - Boston},
     year = {2016},
     pages = {231259}}
    
  47. A. Boz & H.Ş. Bilge
    Copy-move image forgery detection based on LBP and DCT
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 561-564
    DOI: 10.1109/SIU.2016.7495802
    BibTeX
    @inproceedings{Boz2016,
     author = {Boz, A. and Bilge, H. Ş.},
     title = {Copy-move image forgery detection based on LBP and DCT},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {561--564}}
    
  48. A. Brock, T. Lim, J.M. Ritchie & N. Weston
    Neural Photo Editing with Introspective Adversarial Networks
    arXiv, 2016
    BibTeX
    @article{Brock2016,
     author = {Brock, Andrew and Lim, Theodore and Ritchie, J. M. and Weston, Nick},
     title = {Neural Photo Editing with Introspective Adversarial Networks},
     journal = {arXiv},
     year = {2016}}
    
  49. M. Bürker & H.P.A. Lensch
    Scene-based Non-uniformity Correction with Readout Noise Compensation
    Image and Video Technology, Springer, 2016
    DOI: 10.1007/978-3-319-29451-3_26
    BibTeX
    @article{Buerker2016,
     author = {Bürker, Martin and Lensch, Hendrik P. A.},
     title = {Scene-based Non-uniformity Correction with Readout Noise Compensation},
     journal = {Image and Video Technology},
     publisher = {Springer},
     year = {2016}}
    
  50. T. Carvalho, F.A. Faria, H. Pedrini, R. da S. Torres & A. Rocha
    Illuminant-based Transformed Spaces for Image Forensics
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(4), pp. 720-733
    DOI: 10.1109/TIFS.2015.2506548
    BibTeX
    @article{Carvalho2016,
     author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and da S. Torres, R. and Rocha, A.},
     title = {Illuminant-based Transformed Spaces for Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {4},
     pages = {720--733}}
    
  51. G. Cattaneo, G. Roscigno & A. Bruno
    Using PNU-based Techniques to Detect Alien Frames in Videos
    Advanced Concepts for Intelligent Vision Systems, Springer, 2016
    DOI: 10.1007/978-3-319-48680-2_64
    BibTeX
    @article{Cattaneo2016,
     author = {Cattaneo, Giuseppe and Roscigno, Gianluca and Bruno, Andrea},
     title = {Using PNU-based Techniques to Detect Alien Frames in Videos},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2016}}
    
  52. S. Chakraborty & M. Kirchner
    Compression Forensics beyond the First Significant Digit
    2016
    DOI: 10.1109/wifs.2015.7368578
    BibTeX
    @electronic{Chakraborty2016,
     author = {Chakraborty, Sujoy and Kirchner, Matthias},
     title = {Compression Forensics beyond the First Significant Digit},
     year = {2016}}
    
  53. D. Chauhan, D. Kasat, S. Jain & V. Thakare
    Survey on Keypoint Based Copy-move Forgery Detection Methods on Image
    Procedia Computer Science, Elsevier BV, 2016, Vol. 85, pp. 206-212
    DOI: 10.1016/j.procs.2016.05.213
    BibTeX
    @article{Chauhan2016,
     author = {Chauhan, Devanshi and Kasat, Dipali and Jain, Sanjeev and Thakare, Vilas},
     title = {Survey on Keypoint Based Copy-move Forgery Detection Methods on Image},
     journal = {Procedia Computer Science},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {85},
     pages = {206--212}}
    
  54. C.-C. Chen, H. Wang & C.-S. Lin
    An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4179-3
    BibTeX
    @article{Chen2016c,
     author = {Chen, Chien-Chang and Wang, Han and Lin, Cheng-Shian},
     title = {An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  55. H.-p. Chen, X.-J. Shen & J.-W. Long
    Histogram-based Colour Image Fuzzy Clustering Algorithm
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(18), pp. 11417
    DOI: 10.1007/s11042-015-2860-6
    BibTeX
    @article{Chen2016a,
     author = {Chen, Hai-peng and Shen, Xuan-Jing and Long, Jian-Wu},
     title = {Histogram-based Colour Image Fuzzy Clustering Algorithm},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {18},
     pages = {11417}}
    
  56. J. Chen, X. Jiang, T. Sun, P. He & S. Wang
    Detecting Double MPEG Compression with the Same Quantiser Scale Based on Mbm Feature
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2064-2068
    DOI: 10.1109/ICASSP.2016.7472040
    BibTeX
    @inproceedings{Chen2016,
     author = {Chen, J. and Jiang, X. and Sun, T. and He, P. and Wang, S.},
     title = {Detecting Double MPEG Compression with the Same Quantiser Scale Based on Mbm Feature},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2064--2068}}
    
  57. S. Chen, S. Tan, B. Li & J. Huang
    Automatic Detection of Object-Based Forgery in Advanced Video
    IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. 26(11), pp. 2138-2151
    DOI: 10.1109/TCSVT.2015.2473436
    BibTeX
    @article{Chen2016b,
     author = {Chen, S. and Tan, S. and Li, B. and Huang, J.},
     title = {Automatic Detection of Object-Based Forgery in Advanced Video},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2016},
     volume = {26},
     number = {11},
     pages = {2138--2151}}
    
  58. X. Chu, Y. Chen & K.J.R. Liu
    An information theoretic framework for order of operations forensics
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2049-2053
    DOI: 10.1109/ICASSP.2016.7472037
    BibTeX
    @inproceedings{Chu2016,
     author = {Chu, X. and Chen, Y. and Liu, K. J. R.},
     title = {An information theoretic framework for order of operations forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2049--2053}}
    
  59. X. Chu, Y. Chen & K.J.R. Liu
    Detectability of the Order of Operations: An Information Theoretic Approach
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(4), pp. 823-836
    DOI: 10.1109/TIFS.2015.2510958
    BibTeX
    @article{Chu2016a,
     author = {Chu, X. and Chen, Y. and Liu, K. J. R.},
     title = {Detectability of the Order of Operations: An Information Theoretic Approach},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {4},
     pages = {823--836}}
    
  60. D. Cozzolino & L. Verdoliva
    Single-image splicing localization through autoencoder-based anomaly detection
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823921
    BibTeX
    @inproceedings{Cozzolino2016,
     author = {Cozzolino, D. and Verdoliva, L.},
     title = {Single-image splicing localization through autoencoder-based anomaly detection},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  61. R. Cristin & V.C. Raj
    Exposing Image Manipulation with Curved Surface Reflection
    Indian Journal of Science and Technology, Indian Society for Education and Environment, 2016, Vol. 9(38)
    DOI: 10.17485/ijst/2016/v9i38/99998
    BibTeX
    @article{Cristin2016,
     author = {Cristin, R. and Raj, V. Cyril},
     title = {Exposing Image Manipulation with Curved Surface Reflection},
     journal = {Indian Journal of Science and Technology},
     publisher = {Indian Society for Education and Environment},
     year = {2016},
     volume = {9},
     number = {38}}
    
  62. N. Dalmia & M. Okade
    First Quantization Matrix Estimation for Double Compressed JPEG Images Utilizing Novel DCT Histogram Selection Strategy
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing - ICVGIP '16
    ACM, 2016, pp. 271-278
    DOI: 10.1145/3009977.3010067
    BibTeX
    @inproceedings{Dalmia2016,
     author = {Dalmia, Nandita and Okade, Manish},
     title = {First Quantization Matrix Estimation for Double Compressed JPEG Images Utilizing Novel DCT Histogram Selection Strategy},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing - ICVGIP '16},
     publisher = {ACM},
     year = {2016},
     pages = {271--278}}
    
  63. N. Dalmia & M. Okade
    A novel technique for misalignment parameter estimation in double compressed JPEG images
    Proc. Visual Communications and Image Processing (VCIP)
    2016, pp. 1-4
    DOI: 10.1109/VCIP.2016.7805446
    BibTeX
    @inproceedings{Dalmia2016a,
     author = {Dalmia, N. and Okade, M.},
     title = {A novel technique for misalignment parameter estimation in double compressed JPEG images},
     booktitle = {Proc. Visual Communications and Image Processing (VCIP)},
     year = {2016},
     pages = {1--4}}
    
  64. A. Das, A. Medhi, R.K. Karsh & R.H. Laskar
    Image splicing detection using Gaussian or defocus blur
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1237-1241
    DOI: 10.1109/ICCSP.2016.7754350
    BibTeX
    @inproceedings{Das2016,
     author = {Das, A. and Medhi, A. and Karsh, R. K. and Laskar, R. H.},
     title = {Image splicing detection using Gaussian or defocus blur},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1237--1241}}
    
  65. R. Davarzani, S. Mozaffari & K. Yaghmaie
    Perceptual Image Hashing Using Center-symmetric Local Binary Patterns
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(8), pp. 4639
    DOI: 10.1007/s11042-015-2496-6
    BibTeX
    @article{Davarzani2016,
     author = {Davarzani, Reza and Mozaffari, Saeed and Yaghmaie, Khashayar},
     title = {Perceptual Image Hashing Using Center-symmetric Local Binary Patterns},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {8},
     pages = {4639}}
    
  66. J. De Bock & P. De Smet
    Jpgcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 19-34
    DOI: 10.1109/TIFS.2015.2475238
    BibTeX
    @article{DeBock2016,
     author = {De Bock, J. and De Smet, P.},
     title = {Jpgcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {19--34}}
    
  67. L. Debiasi & A. Uhl
    Comparison of PRNU Enhancement Techniques to Generate PRNU Fingerprints for Biometric Source Sensor Attribution
    2016 4th International Conference on Biometrics and Forensics (IWBF)
    2016, pp. 1-6
    DOI: 10.1109/IWBF.2016.7449674
    BibTeX
    @inproceedings{Debiasi2016,
     author = {Debiasi, L. and Uhl, A.},
     title = {Comparison of PRNU Enhancement Techniques to Generate PRNU Fingerprints for Biometric Source Sensor Attribution},
     booktitle = {2016 4th International Conference on Biometrics and Forensics (IWBF)},
     year = {2016},
     pages = {1--6}}
    
  68. F. Ding, W. Dong, G. Zhu & Y.-Q. Shi
    An Advanced Texture Analysis Method for Image Sharpening Detection
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_7
    BibTeX
    @article{Ding2016,
     author = {Ding, Feng and Dong, Weiqiang and Zhu, Guopu and Shi, Yun-Qing},
     title = {An Advanced Texture Analysis Method for Image Sharpening Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  69. A. Dixit & R.K. Gupta
    Copy-move Image Forgery Detection Using Frequency-based Techniques: A Review
    International Journal of Signal Processing, Image Processing and Pattern Recognition, Science and Engineering Research Support Society, 2016, Vol. 9(3), pp. 71-88
    DOI: 10.14257/ijsip.2016.9.3.07
    BibTeX
    @article{Dixit2016,
     author = {Dixit, Anuja and Gupta, R. K.},
     title = {Copy-move Image Forgery Detection Using Frequency-based Techniques: A Review},
     journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {9},
     number = {3},
     pages = {71--88}}
    
  70. R. Dixit & R. Naskar
    Dywt Based Copy-move Forgery Detection with Improved Detection Accuracy
    Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2016, pp. 133-138
    DOI: 10.1109/SPIN.2016.7566676
    BibTeX
    @inproceedings{Dixit2016a,
     author = {Dixit, R. and Naskar, R.},
     title = {Dywt Based Copy-move Forgery Detection with Improved Detection Accuracy},
     booktitle = {Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2016},
     pages = {133--138}}
    
  71. J. Dong, L. Chen, J. Tian & X. Xu
    A Novel Image Splicing Detection Method Based on the Inconsistency of Image Noise
    Proc. IEEE 11th Conf. Industrial Electronics and Applications (ICIEA)
    2016, pp. 560-563
    DOI: 10.1109/ICIEA.2016.7603647
    BibTeX
    @inproceedings{Dong2016,
     author = {Dong, J. and Chen, L. and Tian, J. and Xu, X.},
     title = {A Novel Image Splicing Detection Method Based on the Inconsistency of Image Noise},
     booktitle = {Proc. IEEE 11th Conf. Industrial Electronics and Applications (ICIEA)},
     year = {2016},
     pages = {560--563}}
    
  72. W. Dong & J. Wang
    JPEG Compression Forensics against Resizing
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2016, pp. 1001-1007
    DOI: 10.1109/TrustCom.2016.0168
    BibTeX
    @inproceedings{Dong2016a,
     author = {Dong, W. and Wang, J.},
     title = {JPEG Compression Forensics against Resizing},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2016},
     pages = {1001--1007}}
    
  73. S. Dua, J. Singh & H. Parthasarathy
    Rotation angle estimation of an image using least square method
    Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2016, pp. 296-300
    DOI: 10.1109/SPIN.2016.7566707
    BibTeX
    @inproceedings{Dua2016,
     author = {Dua, S. and Singh, J. and Parthasarathy, H.},
     title = {Rotation angle estimation of an image using least square method},
     booktitle = {Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2016},
     pages = {296--300}}
    
  74. Y. Duan, D. Bouslimi, G. Yang, H. Shu & G. Coatrieux
    Computed Tomography Image Origin Identification Based on Original Sensor Pattern Noise and 3D Image Reconstruction Algorithm Footprints
    IEEE Journal of Biomedical and Health Informatics, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/JBHI.2016.2575398
    BibTeX
    @article{Duan2016,
     author = {Duan, Y. and Bouslimi, D. and Yang, G. and Shu, H. and Coatrieux, G.},
     title = {Computed Tomography Image Origin Identification Based on Original Sensor Pattern Noise and 3D Image Reconstruction Algorithm Footprints},
     journal = {IEEE Journal of Biomedical and Health Informatics},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  75. E.-S.M. El-Alfy & M.A. Qureshi
    Robust Content Authentication of Gray and Color Images Using LBP-dct Markov-based Features
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3855-7
    BibTeX
    @article{El-Alfy2016,
     author = {El-Alfy, El-Sayed M. and Qureshi, Muhammad A.},
     title = {Robust Content Authentication of Gray and Color Images Using LBP-dct Markov-based Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  76. A. Elliethy & G. Sharma
    Image Anonymization for PRNU Forensics: A Set Theoretic Framework Addressing Compression Resilience
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3907-3911
    DOI: 10.1109/ICIP.2016.7533092
    BibTeX
    @inproceedings{Elliethy2016,
     author = {Elliethy, A. and Sharma, G.},
     title = {Image Anonymization for PRNU Forensics: A Set Theoretic Framework Addressing Compression Resilience},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3907--3911}}
    
  77. A. Elliethy & G. Sharma
    Image anonymization for PRNU forensics: A set theoretic framework addressing compression resilience
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3907-3911
    DOI: 10.1109/ICIP.2016.7533092
    BibTeX
    @inproceedings{Elliethy2016a,
     author = {Elliethy, A. and Sharma, G.},
     title = {Image anonymization for PRNU forensics: A set theoretic framework addressing compression resilience},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3907--3911}}
    
  78. M. Emam, Q. Han & H. Zhang
    A Keypoint-based Region Duplication Forgery Detection Algorithm
    IEICE TRANSACTIONS on Information and Systems, 2016, Vol. 99-(9), pp. 2413-2416
    DOI: 10.1587/transinf.2016edl8024
    BibTeX
    @article{Emam2016,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {A Keypoint-based Region Duplication Forgery Detection Algorithm},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2016},
     volume = {99-},
     number = {9},
     pages = {2413--2416}}
    
  79. M. Emam, Q. Han & H. Zhang
    Detection of Copy-scale-move Forgery in Digital Images Using Sfop and MROGH
    Social Computing
    Springer, 2016
    DOI: 10.1007/978-981-10-2053-7_29
    BibTeX
    @incollection{Emam2016a,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {Detection of Copy-scale-move Forgery in Digital Images Using Sfop and MROGH},
     booktitle = {Social Computing},
     publisher = {Springer},
     year = {2016}}
    
  80. N.I. Evdokimova & A.V. Kuznetsov
    Copy - Move Detection Algorithm Based on Local Derivative Pattern S
    Information Technology and Nanotechnolog, 2016
    DOI: 10.18287/1613-0073-2016-1638-304-312
    BibTeX
    @article{Evdokimova2016,
     author = {Evdokimova, N. I. and Kuznetsov, A. V.},
     title = {Copy - Move Detection Algorithm Based on Local Derivative Pattern S},
     journal = {Information Technology and Nanotechnolog},
     year = {2016}}
    
  81. S. Fahd, M.M.W. Iqbal, M. Arif & M.I. Javed
    Integrated Model: Statistical Features, Memory Analysis for Scanner and Printer Forensics
    Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)
    2016, pp. 74-77
    DOI: 10.1109/ISDFS.2016.7473521
    BibTeX
    @inproceedings{Fahd2016,
     author = {Fahd, S. and Iqbal, M. M. W. and Arif, M. and Javed, M. I.},
     title = {Integrated Model: Statistical Features, Memory Analysis for Scanner and Printer Forensics},
     booktitle = {Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)},
     year = {2016},
     pages = {74--77}}
    
  82. G. Fahmy & R. Wurtz
    Phase based forgery detection of JPEG anti forensics
    Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)
    2016, pp. 144-149
    DOI: 10.1109/ISSPIT.2016.7886024
    BibTeX
    @inproceedings{Fahmy2016b,
     author = {Fahmy, G. and Wurtz, R.},
     title = {Phase based forgery detection of JPEG anti forensics},
     booktitle = {Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)},
     year = {2016},
     pages = {144--149}}
    
  83. M.F. Fahmy & O.M. Fahmy
    A New Morphological Based Forgery Detection Scheme
    2016 33rd National Radio Science Conference (NRSC)
    2016, pp. 212-216
    DOI: 10.1109/NRSC.2016.7450830
    BibTeX
    @inproceedings{Fahmy2016,
     author = {Fahmy, M. F. and Fahmy, O. M.},
     title = {A New Morphological Based Forgery Detection Scheme},
     booktitle = {2016 33rd National Radio Science Conference (NRSC)},
     year = {2016},
     pages = {212--216}}
    
  84. O.M. Fahmy
    A new Zernike moments based technique for camera identification and forgery detection
    Signal, Image and Video Processing, Springer, 2016, pp. 1
    DOI: 10.1007/s11760-016-1023-1
    BibTeX
    @article{Fahmy2016a,
     author = {Fahmy, O. M.},
     title = {A new Zernike moments based technique for camera identification and forgery detection},
     journal = {Signal, Image and Video Processing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  85. J. Fan, T. Chen & A.C. Kot
    EXIF-white Balance Recognition for Image Forensic Analysis
    Multidimensional Systems and Signal Processing, Springer, 2016, pp. 1
    DOI: 10.1007/s11045-015-0377-9
    BibTeX
    @article{Fan2016,
     author = {Fan, Jiayuan and Chen, Tao and Kot, Alex ChiChung},
     title = {EXIF-white Balance Recognition for Image Forensic Analysis},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  86. W. Fan, G. Valenzise, F. Banterle & F. Dufaux
    Forensic Detection of Inverse Tone Mapping in Hdr Images
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 166-170
    DOI: 10.1109/ICIP.2016.7532340
    BibTeX
    @inproceedings{Fan2016a,
     author = {Fan, W. and Valenzise, G. and Banterle, F. and Dufaux, F.},
     title = {Forensic Detection of Inverse Tone Mapping in Hdr Images},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {166--170}}
    
  87. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Corrections to “JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality ” [Aug 14 1211-1226]
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(11), pp. 2628
    DOI: 10.1109/TIFS.2016.2585398
    BibTeX
    @article{Fan2016b,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Corrections to “JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality ” [Aug 14 1211-1226]},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {11},
     pages = {2628}}
    
  88. A. Ferreira, S.C. Felipussi, C. Alfaro, P. Fonseca, J.E. Vargas-Muñoz, J.A. dos Santos & A. Rocha
    Behavior Knowledge Space-based Fusion for Copy --move Forgery Detection
    IEEE Transactions on Image Processing, 2016, Vol. 25(10), pp. 4729-4742
    DOI: 10.1109/TIP.2016.2593583
    BibTeX
    @article{Ferreira2016,
     author = {Ferreira, A. and Felipussi, S. C. and Alfaro, C. and Fonseca, P. and Vargas-Muñoz, J. E. and dos Santos, J. A. and Rocha, A.},
     title = {Behavior Knowledge Space-based Fusion for Copy --move Forgery Detection},
     journal = {IEEE Transactions on Image Processing},
     year = {2016},
     volume = {25},
     number = {10},
     pages = {4729--4742}}
    
  89. A. Ferreira, J.A.D. Santos & A. Rocha
    Multi-directional and Multi-scale Perturbation Approaches for Blind Forensic Median Filtering Detection
    Intelligent Data Analysis, IOS Press, 2016, Vol. 20(s1), pp. S17-S36
    DOI: 10.3233/IDA-160843
    BibTeX
    @article{Ferreira2016a,
     author = {Ferreira, Anselmo and Santos, Jefersson A. Dos and Rocha, Anderson},
     title = {Multi-directional and Multi-scale Perturbation Approaches for Blind Forensic Median Filtering Detection},
     journal = {Intelligent Data Analysis},
     publisher = {IOS Press},
     year = {2016},
     volume = {20},
     number = {s1},
     pages = {S17-S36}}
    
  90. F. Galvan
    First Quantization Table Detection in Double Compressed JPEG Images
    Universitversità degli Studi di Udine, DIPARTIMENTO MATEMATICA E INFORMATICA - DIMI, Università degli Studi di Udine, Dottorato di ricerca in Dottorato di ricerca in Informatica, 27, 2016
    BibTeX
    @phdthesis{Galvan2016,
     author = {Galvan, Fausto},
     title = {First Quantization Table Detection in Double Compressed JPEG Images},
     school = {Universitversità degli Studi di Udine, DIPARTIMENTO MATEMATICA E INFORMATICA - DIMI},
     year = {2016}}
    
  91. Y. Gan & J. Zhong
    Application of Afmt Method for Composite Forgery Detection
    Nonlinear Dynamics, Springer, 2016, Vol. 84(1), pp. 341
    DOI: 10.1007/s11071-015-2524-0
    BibTeX
    @article{Gan2016,
     author = {Gan, Yanfen and Zhong, Junliu},
     title = {Application of Afmt Method for Composite Forgery Detection},
     journal = {Nonlinear Dynamics},
     publisher = {Springer},
     year = {2016},
     volume = {84},
     number = {1},
     pages = {341}}
    
  92. O. Giudice, A. Paratore, M. Moltisanti & S. Battiato
    A Classification Engine for Image Ballistics of Social Data
    ArXiv, 2016
    BibTeX
    @article{Giudice2016,
     author = {Giudice, Oliver and Paratore, Antonino and Moltisanti, Marco and Battiato, Sebastiano},
     title = {A Classification Engine for Image Ballistics of Social Data},
     journal = {ArXiv},
     year = {2016}}
    
  93. J. Gong & J. Guo
    Image Copy-move Forgery Detection Using SURF in Opponent Color Space
    Transactions of Tianjin University, Springer, 2016, Vol. 22(2), pp. 151
    DOI: 10.1007/s12209-016-2705-z
    BibTeX
    @article{Gong2016,
     author = {Gong, Jiachang and Guo, Jichang},
     title = {Image Copy-move Forgery Detection Using SURF in Opponent Color Space},
     journal = {Transactions of Tianjin University},
     publisher = {Springer},
     year = {2016},
     volume = {22},
     number = {2},
     pages = {151}}
    
  94. R.E.J. Granty & G. Kousalya
    Spectral-hashing-based Image Retrieval and Copy-move Forgery Detection
    Australian Journal of Forensic Sciences, Taylor & Francis, 2016, pp. 1-16
    DOI: 10.1080/00450618.2015.1128966
    BibTeX
    @article{Granty2016,
     author = {Granty, Regina Elwin J. and Kousalya, G.},
     title = {Spectral-hashing-based Image Retrieval and Copy-move Forgery Detection},
     journal = {Australian Journal of Forensic Sciences},
     publisher = {Taylor & Francis},
     year = {2016},
     pages = {1--16}}
    
  95. Y. Gu, S. Wang, X. Lin & T. Sun
    USM Sharpening Detection Based on Sparse Coding
    Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)
    2016, pp. 1-5
    DOI: 10.1109/DICTA.2016.7797092
    BibTeX
    @inproceedings{Gu2016,
     author = {Gu, Y. and Wang, S. and Lin, X. and Sun, T.},
     title = {USM Sharpening Detection Based on Sparse Coding},
     booktitle = {Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)},
     year = {2016},
     pages = {1--5}}
    
  96. S. Gupta & P.S. Sandhu
    Highlighting Image Tampering by Feature Extraction Based on Image Quality Deterioration
    Proc. 3rd Int. Conf. Computing for Sustainable Global Development (INDIACom)
    2016, pp. 2362-2367
    BibTeX
    @inproceedings{Gupta2016,
     author = {Gupta, S. and Sandhu, P. S.},
     title = {Highlighting Image Tampering by Feature Extraction Based on Image Quality Deterioration},
     booktitle = {Proc. 3rd Int. Conf. Computing for Sustainable Global Development (INDIACom)},
     year = {2016},
     pages = {2362--2367}}
    
  97. J.G. Han, T.H. Park, Y.H. Moon & I.K. Eom
    Efficient Markov Feature Extraction Method for Image Splicing Detection Using Maximization and Threshold Expansion
    Journal of Electronic Imaging, 2016, Vol. 25(2), pp. 023031
    DOI: 10.1117/1.JEI.25.2.023031
    BibTeX
    @article{Han2016,
     author = {Han, Jong Goo and Park, Tae Hee and Moon, Yong Ho and Eom, Il Kyu},
     title = {Efficient Markov Feature Extraction Method for Image Splicing Detection Using Maximization and Threshold Expansion},
     journal = {Journal of Electronic Imaging},
     year = {2016},
     volume = {25},
     number = {2},
     pages = {023031}}
    
  98. J.-G. Han, I.-K. Eom, Y.-H. Moon & S.-W. Ha
    Selective Feature Extraction Method between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection
    Journal of the Korea Institute of Information and Communication Engineering, The Korean Institute of Information and Communication Sciences, 2016, Vol. 20(4), pp. 833-839
    DOI: 10.6109/jkiice.2016.20.4.833
    BibTeX
    @article{Han2016a,
     author = {Han, Jong-Goo and Eom, Il-Kyu and Moon, Yong-Ho and Ha, Seok-Wun},
     title = {Selective Feature Extraction Method between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection},
     journal = {Journal of the Korea Institute of Information and Communication Engineering},
     publisher = {The Korean Institute of Information and Communication Sciences},
     year = {2016},
     volume = {20},
     number = {4},
     pages = {833--839}}
    
  99. M.F. Hashmi, A.G. Keskara & V. Yadav
    Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning
    International Journal of Computational Intelligence Systems, 2016, Vol. 9(2), pp. 351-375
    DOI: 10.1080/18756891.2016.1161364
    BibTeX
    @article{Hashmi2016,
     author = {Hashmi, Mohammad Farukh and Keskara, Avinash G. and Yadav, Vikas},
     title = {Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning},
     journal = {International Journal of Computational Intelligence Systems},
     year = {2016},
     volume = {9},
     number = {2},
     pages = {351--375}}
    
  100. K. Henry
    Digital Photography Analysis: Analytical Framework for Measuring the Effects of Saturation on Photo Response Non-uniformity
    University of Central Florida, University of Central Florida, 2016
    BibTeX
    @mastersthesis{Henry2016,
     author = {Henry, Kris},
     title = {Digital Photography Analysis: Analytical Framework for Measuring the Effects of Saturation on Photo Response Non-uniformity},
     school = {University of Central Florida},
     year = {2016}}
    
  101. O. Holmes, M.S. Banks & H. Farid
    Assessing and Improving the Identification of Computer-generated Portraits
    ACM Trans. Appl. Percept., ACM, 2016, Vol. 13(2), pp. 71-712
    DOI: 10.1145/2871714
    BibTeX
    @article{Holmes2016,
     author = {Holmes, Olivia and Banks, Martin S. and Farid, Hany},
     title = {Assessing and Improving the Identification of Computer-generated Portraits},
     journal = {ACM Trans. Appl. Percept.},
     publisher = {ACM},
     year = {2016},
     volume = {13},
     number = {2},
     pages = {71--712}}
    
  102. J.U. Hou & H.K. Lee
    Detection of Hue Modification Using Photo Response Non-uniformity
    IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TCSVT.2016.2539828
    BibTeX
    @article{Hou2016,
     author = {Hou, J. U. and Lee, H. K.},
     title = {Detection of Hue Modification Using Photo Response Non-uniformity},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  103. A. van den Hout & I. Alberink
    Posterior distributions for likelihood ratios in forensic science
    Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 397-401
    DOI: 10.1016/j.scijus.2016.06.011
    BibTeX
    @article{VandenHout2016,
     author = {van den Hout, Ardo and Alberink, Ivo},
     title = {Posterior distributions for likelihood ratios in forensic science},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {56},
     number = {5},
     pages = {397--401}}
    
  104. D. Hu, X. Zhang, Y. Fan, Z.-Q. Zhao, L. Wang, X. Wu & X. Wu
    On Digital Image Trustworthiness
    Applied Soft Computing, Elsevier BV, 2016, Vol. 48, pp. 240-253
    DOI: 10.1016/j.asoc.2016.07.010
    BibTeX
    @article{Hu2016c,
     author = {Hu, Donghui and Zhang, Xiaotian and Fan, Yuqi and Zhao, Zhong-Qiu and Wang, Lina and Wu, Xintao and Wu, Xindong},
     title = {On Digital Image Trustworthiness},
     journal = {Applied Soft Computing},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {48},
     pages = {240--253}}
    
  105. W.-C. Hu, W.-H. Chen, D.-Y. Huang & C.-Y. Yang
    Effective Image Forgery Detection of Tampered Foreground or Background Image Based on Image Watermarking and Alpha Mattes
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(6), pp. 3495
    DOI: 10.1007/s11042-015-2449-0
    BibTeX
    @article{Hu2016,
     author = {Hu, Wu-Chih and Chen, Wei-Hao and Huang, Deng-Yuan and Yang, Ching-Yu},
     title = {Effective Image Forgery Detection of Tampered Foreground or Background Image Based on Image Watermarking and Alpha Mattes},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {6},
     pages = {3495}}
    
  106. X. Hu, J. Ni & R. Pan
    Detecting Video Forgery by Estimating Extrinsic Camera Parameters
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_3
    BibTeX
    @article{Hu2016a,
     author = {Hu, Xianglei and Ni, Jiangqun and Pan, Runbiao},
     title = {Detecting Video Forgery by Estimating Extrinsic Camera Parameters},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  107. Y.-C. Hu, C.-C. Lo & W.-L. Chen
    Probability-based Reversible Image Authentication Scheme for Image Demosaicking
    Future Generation Computer Systems, Elsevier BV, 2016, Vol. 62, pp. 92-103
    DOI: 10.1016/j.future.2016.04.001
    BibTeX
    @article{Hu2016b,
     author = {Hu, Yu-Chen and Lo, Chun-Chi and Chen, Wu-Lin},
     title = {Probability-based Reversible Image Authentication Scheme for Image Demosaicking},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {62},
     pages = {92--103}}
    
  108. Y. Huang, J. Zhang & X. Lan
    Source Camera Identification with Imbalanced Training Dataset
    IJDTA, Science and Engineering Research Support Society, 2016, Vol. 9(1), pp. 205-214
    DOI: 10.14257/ijdta.2016.9.2.22
    BibTeX
    @article{Huang2016,
     author = {Huang, Yonggang and Zhang, Jun and Lan, Xinkai},
     title = {Source Camera Identification with Imbalanced Training Dataset},
     journal = {IJDTA},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {9},
     number = {1},
     pages = {205--214}}
    
  109. T. Huynh-Kha, T. Le-Tien, S. Ha & K. Huynh-Van
    Improving the Computational Cost for Copied Region Detection in Forensic Images
    JOURNAL OF SCIENCE AND TECHNOLOGY: ISSUE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY, 2016, Vol. 2(1), pp. 55-63
    BibTeX
    @article{Huynh-Kha2016,
     author = {Huynh-Kha, Tu and Le-Tien, Thuong and Ha, Synh and Huynh-Van, Khoa},
     title = {Improving the Computational Cost for Copied Region Detection in Forensic Images},
     journal = {JOURNAL OF SCIENCE AND TECHNOLOGY: ISSUE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY},
     year = {2016},
     volume = {2},
     number = {1},
     pages = {55--63}}
    
  110. J.J. Hwang & K.H. Rhee
    Gaussian filtering detection based on features of residuals in image forensics
    Proc. and Vision for the Future (RIVF) 2016 IEEE RIVF Int. Conf. Computing Communication Technologies, Research, Innovation
    2016, pp. 153-157
    DOI: 10.1109/RIVF.2016.7800286
    BibTeX
    @inproceedings{Hwang2016a,
     author = {Hwang, J. J. and Rhee, K. H.},
     title = {Gaussian filtering detection based on features of residuals in image forensics},
     booktitle = {Proc. and Vision for the Future (RIVF) 2016 IEEE RIVF Int. Conf. Computing Communication Technologies, Research, Innovation},
     year = {2016},
     pages = {153--157}}
    
  111. M. gu Hwang, S. m.K. & D. hwan Har
    A Method of Identifying Digital Images with Geometric Distortion
    Australian Journal of Forensic Sciences, 2016
    DOI: 10.1080/00450618.2015.1128970
    BibTeX
    @article{Hwang2016,
     author = {gu Hwang, Min and , Sung min Kim and hwan Har, Dong},
     title = {A Method of Identifying Digital Images with Geometric Distortion},
     journal = {Australian Journal of Forensic Sciences},
     year = {2016}}
    
  112. M.M. Isaac & M. Wilscy
    A key point based copy-move forgery detection using HOG features
    Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
    2016, pp. 1-6
    DOI: 10.1109/ICCPCT.2016.7530253
    BibTeX
    @inproceedings{Isaac2016,
     author = {Isaac, M. M. and Wilscy, M.},
     title = {A key point based copy-move forgery detection using HOG features},
     booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit},
     year = {2016},
     pages = {1--6}}
    
  113. M. Iuliani
    Image Forensics in the Wild
    Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM, Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM, 2016
    BibTeX
    @phdthesis{Iuliani2016a,
     author = {Iuliani, Massimo},
     title = {Image Forensics in the Wild},
     school = {Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM},
     year = {2016}}
    
  114. M. Iuliani, M. Fanfani, C. Colombo & A. Piva
    Reliability Assessment of Principal Point Estimates for Forensic Applications
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016
    DOI: 10.1016/j.jvcir.2016.11.010
    BibTeX
    @article{Iuliani2016,
     author = {Iuliani, Massimo and Fanfani, Marco and Colombo, Carlo and Piva, Alessandro},
     title = {Reliability Assessment of Principal Point Estimates for Forensic Applications},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  115. M. Jahanirad, A.W.A. Wahab & N.B. Anuar
    An Evolution of Image Source Camera Attribution Approaches
    Forensic Sci Int, Elsevier BV, 2016, Vol. 262, pp. 242275
    DOI: 10.1016/j.forsciint.2016.03.035
    BibTeX
    @article{Jahanirad2016,
     author = {Jahanirad, Mehdi and Wahab, Ainuddin Wahid Abdul and Anuar, Nor Badrul},
     title = {An Evolution of Image Source Camera Attribution Approaches},
     journal = {Forensic Sci Int},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {262},
     pages = {242275}}
    
  116. H.A. Jalab, Z. Moghaddasi, A.M. Hasan & Z. Wakaf
    Image Splicing Detection Using Electromagnetism like Based Descriptor.
    Proc. of the SAI Intelligent Systems Conference 2016, 2016
    BibTeX
    @article{Jalab2016,
     author = {Jalab, Hamid A. and Moghaddasi, Zahra and Hasan, Ali M. and Wakaf, Zouhir},
     title = {Image Splicing Detection Using Electromagnetism like Based Descriptor.},
     journal = {Proc. of the SAI Intelligent Systems Conference 2016},
     year = {2016}}
    
  117. D.C. Jeronymo
    Semi-automatic wavelet soft-thresholding applied to digital image error level analysis
    PeerJ Preprints, 2016
    DOI: 10.7287/peerj.preprints.2619v1
    BibTeX
    @electronic{Jeronymo2016,
     author = {Jeronymo, Daniel C.},
     title = {Semi-automatic wavelet soft-thresholding applied to digital image error level analysis},
     publisher = {PeerJ Preprints},
     year = {2016}}
    
  118. X. Jiang, S. Wei, R. Zhao, Y. Zhao & X. Wu
    Camera Fingerprint: A New Perspective for Identifying User's Identity
    arXiv, 2016
    BibTeX
    @article{Jiang2016,
     author = {Jiang, Xiang and Wei, Shikui and Zhao, Ruizhen and Zhao, Yao and Wu, Xindong},
     title = {Camera Fingerprint: A New Perspective for Identifying User's Identity},
     journal = {arXiv},
     year = {2016}}
    
  119. X. Jinke
    Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments
    International Journal of Security and Its Applications, 2016, Vol. 10(2), pp. 27-38
    DOI: 10.14257/ijsia.2016.10.2.03
    BibTeX
    @article{Jinke2016,
     author = {Jinke, Xiao},
     title = {Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments},
     journal = {International Journal of Security and Its Applications},
     year = {2016},
     volume = {10},
     number = {2},
     pages = {27--38}}
    
  120. T. Julliand, V. Nozick & H. Talbot
    Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images
    2016
    DOI: 10.1049/ic.2015.0111
    BibTeX
    @unpublished{Julliand2016,
     author = {Julliand, Thibault and Nozick, Vincent and Talbot, Hugues},
     title = {Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images},
     year = {2016}}
    
  121. T. Julliand, V. Nozick & H. Talbot
    Image Noise and Digital Image Forensics
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_1
    BibTeX
    @article{Julliand2016a,
     author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues},
     title = {Image Noise and Digital Image Forensics},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  122. T. Julliand, V. Nozick & H. Talbot
    Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images
    Advanced Concepts for Intelligent Vision Systems, Springer, 2016
    DOI: 10.1007/978-3-319-48680-2_12
    BibTeX
    @article{Julliand2016b,
     author = {Julliand, Thibault and Nozick, Vincent and Talbot, Hugues},
     title = {Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2016}}
    
  123. J. Kamenicky, M. Bartos, J. Flusser, B. Mahdian, J. Kotera, A. Novozamsky, S. Saic, F. Sroubek, M. Sorel, A. Zita, B. Zitova, Z. Sima, P. Svarc & J. Horinek
    Pizzaro: Forensic Analysis and Restoration of Image and Video Data
    Forensic Science International, 2016, Vol. 264, pp. 153-166
    DOI: 10.1016/j.forsciint.2016.04.027
    BibTeX
    @article{Kamenicky2016,
     author = {Kamenicky, Jan and Bartos, Michal and Flusser, Jan and Mahdian, Babak and Kotera, Jan and Novozamsky, Adam and Saic, Stanislav and Sroubek, Filip and Sorel, Michal and Zita, Ales and Zitova, Barbara and Sima, Zdenek and Svarc, Petr and Horinek, Jan},
     title = {Pizzaro: Forensic Analysis and Restoration of Image and Video Data},
     journal = {Forensic Science International},
     year = {2016},
     volume = {264},
     pages = {153--166}}
    
  124. A.M. Kandepu & R. Naskar
    Classification based time-efficient, blind source camera identification for videos
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 0871-0875
    DOI: 10.1109/ICCSP.2016.7754271
    BibTeX
    @inproceedings{Kandepu2016,
     author = {Kandepu, A. M. and Naskar, R.},
     title = {Classification based time-efficient, blind source camera identification for videos},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {0871--0875}}
    
  125. R.K. Karsh, A. Das, G.L. Swetha, A. Medhi, R.H. Laskar, U. Arya & R.K. Agarwal
    Copy-move forgery detection using ASIFT
    Proc. 1st India Int. Conf. Information Processing (IICIP)
    2016, pp. 1-5
    DOI: 10.1109/IICIP.2016.7975329
    BibTeX
    @inproceedings{Karsh2016,
     author = {Karsh, R. K. and Das, A. and Swetha, G. L. and Medhi, A. and Laskar, R. H. and Arya, U. and Agarwal, R. K.},
     title = {Copy-move forgery detection using ASIFT},
     booktitle = {Proc. 1st India Int. Conf. Information Processing (IICIP)},
     year = {2016},
     pages = {1--5}}
    
  126. C. Kauba & A. Uhl
    PRNU-based Image Alignment for Defective Pixel Detection
    2016
    BibTeX
    @electronic{Kauba2016,
     author = {Kauba, Christof and Uhl, Andreas},
     title = {PRNU-based Image Alignment for Defective Pixel Detection},
     year = {2016}}
    
  127. M. Kaur & S. Gupta
    A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms
    Security in Computing and Communications
    Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_27
    BibTeX
    @incollection{Kaur2016,
     author = {Kaur, Mandeep and Gupta, Savita},
     title = {A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms},
     booktitle = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  128. M. Kaur & S. Gupta
    A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms
    Security in Computing and Communications, Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_27
    BibTeX
    @article{Kaur2016a,
     author = {Kaur, Mandeep and Gupta, Savita},
     title = {A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms},
     journal = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  129. Y. Ke, Q. Shan, F. Qin, W. Min & J. Guo
    Detection of Seam Carved Image Based on Additional Seam Carving Behavior
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2016, Vol. 9(2), pp. 167-178
    DOI: 10.14257/ijsip.2016.9.2.15
    BibTeX
    @article{Ke2016,
     author = {Ke, Yongzhen and Shan, Qingqing and Qin, Fan and Min, Weidong and Guo, Jing},
     title = {Detection of Seam Carved Image Based on Additional Seam Carving Behavior},
     journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition},
     year = {2016},
     volume = {9},
     number = {2},
     pages = {167--178}}
    
  130. A.R.H. Khayeat, X. Sun & P.L. Rosin
    Improved DSIFT Descriptor Based Copy-rotate-move Forgery Detection
    Image and Video Technology, Springer, 2016
    DOI: 10.1007/978-3-319-29451-3_51
    BibTeX
    @article{Khayeat2016,
     author = {Khayeat, Ali Retha Hasoon and Sun, Xianfang and Rosin, Paul L.},
     title = {Improved DSIFT Descriptor Based Copy-rotate-move Forgery Detection},
     journal = {Image and Video Technology},
     publisher = {Springer},
     year = {2016}}
    
  131. Kim
    Building a Database of Dqt Information to Identify a Source of the Smartphone JPEG Image File
    Journal of the Korea Institute of Information Security and Cryptology, Korea Institute of Information Security and Cryptology, 2016, Vol. 26(2), pp. 359-367
    DOI: 10.13089/JKIISC.2016.26.2.359
    BibTeX
    @article{Kim2016,
     author = {Kim},
     title = {Building a Database of Dqt Information to Identify a Source of the Smartphone JPEG Image File},
     journal = {Journal of the Korea Institute of Information Security and Cryptology},
     publisher = {Korea Institute of Information Security and Cryptology},
     year = {2016},
     volume = {26},
     number = {2},
     pages = {359--367}}
    
  132. X. Kong, B. Wang, M. Yang & Y. Feng
    Multiple Heterogeneous JPEG Image Hierarchical Forensic
    Advanced Multimedia and Ubiquitous Engineering
    Springer, 2016
    DOI: 10.1007/978-981-10-1536-6_66
    BibTeX
    @incollection{Kong2016,
     author = {Kong, Xiangwei and Wang, Bo and Yang, Mingliang and Feng, Yue},
     title = {Multiple Heterogeneous JPEG Image Hierarchical Forensic},
     booktitle = {Advanced Multimedia and Ubiquitous Engineering},
     publisher = {Springer},
     year = {2016}}
    
  133. P. Korus & J. Huang
    Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk
    IEEE Signal Processing Letters, 2016, Vol. 23(1), pp. 169-173
    DOI: 10.1109/LSP.2015.2507598
    BibTeX
    @article{Korus2016,
     author = {Korus, P. and Huang, J.},
     title = {Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {1},
     pages = {169--173}}
    
  134. P. Korus & J. Huang
    Multi-scale Fusion for Improved Localization of Malicious Tampering in Digital Images
    IEEE Transactions on Image Processing, 2016, Vol. 25(3), pp. 1312-1326
    DOI: 10.1109/TIP.2016.2518870
    BibTeX
    @article{Korus2016a,
     author = {Korus, P. and Huang, J.},
     title = {Multi-scale Fusion for Improved Localization of Malicious Tampering in Digital Images},
     journal = {IEEE Transactions on Image Processing},
     year = {2016},
     volume = {25},
     number = {3},
     pages = {1312--1326}}
    
  135. P. Korus & J. Huang
    Multi-scale Analysis Strategies in PRNU-based Tampering Localization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2636089
    BibTeX
    @article{Korus2016b,
     author = {Korus, P. and Huang, J.},
     title = {Multi-scale Analysis Strategies in PRNU-based Tampering Localization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  136. P. Korus & J. Huang
    Evaluation of random field models in multi-modal unsupervised tampering localization
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823898
    BibTeX
    @inproceedings{Korus2016c,
     author = {Korus, P. and Huang, J.},
     title = {Evaluation of random field models in multi-modal unsupervised tampering localization},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  137. P. Korus & J. Huang
    Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk
    IEEE Signal Processing Letters, 2016, Vol. 23(1), pp. 169-173
    DOI: 10.1109/LSP.2015.2507598
    BibTeX
    @article{Korus2016d,
     author = {Korus, P. and Huang, J.},
     title = {Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {1},
     pages = {169--173}}
    
  138. M. Kumar & S. Srivastava
    Identifying Photo Forgery using Lighting Elements
    Indian Journal of Science and Technology, Indian Society for Education and Environment, 2016, Vol. 9(48)
    DOI: 10.17485/ijst/2016/v9i48/105748
    BibTeX
    @article{Kumar2016,
     author = {Kumar, Manoj and Srivastava, Sangeet},
     title = {Identifying Photo Forgery using Lighting Elements},
     journal = {Indian Journal of Science and Technology},
     publisher = {Indian Society for Education and Environment},
     year = {2016},
     volume = {9},
     number = {48}}
    
  139. S. Kumar, J.V. Desai & S. Mukherjee
    A Fast Keypoint Based Hybrid Method for Copy Move Forgery Detection
    ArXiv, 2016
    DOI: 10.12785/ijcds/040203
    BibTeX
    @article{Kumar2016a,
     author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev},
     title = {A Fast Keypoint Based Hybrid Method for Copy Move Forgery Detection},
     journal = {ArXiv},
     year = {2016}}
    
  140. R. Kushol, M.S. Salekin, M.H. Kabir & A.A. Khan
    Copy-Move Forgery Detection Using Color Space and Moment Invariants-Based Features
    Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)
    2016, pp. 1-6
    DOI: 10.1109/DICTA.2016.7797027
    BibTeX
    @inproceedings{Kushol2016,
     author = {Kushol, R. and Salekin, M. S. and Kabir, M. H. and Khan, A. A.},
     title = {Copy-Move Forgery Detection Using Color Space and Moment Invariants-Based Features},
     booktitle = {Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)},
     year = {2016},
     pages = {1--6}}
    
  141. A. Kuznetsov
    Remote Sensing Data Copy-move Forgery Protection Algorithm
    Computer Vision and Graphics, Springer, 2016
    DOI: 10.1007/978-3-319-46418-3_48
    BibTeX
    @article{Kuznetsov2016,
     author = {Kuznetsov, Andrey},
     title = {Remote Sensing Data Copy-move Forgery Protection Algorithm},
     journal = {Computer Vision and Graphics},
     publisher = {Springer},
     year = {2016}}
    
  142. A. Kuznetsov & E. Myasnikov
    Copy - Move Detection Algorithm Efficiency Increase Using Binary Space Partitioning Trees
    Information Technology and Nanotechnolog, 2016
    DOI: 10.18287/1613-0073-2016-1638-373-378
    BibTeX
    @article{Kuznetsov2016b,
     author = {Kuznetsov, A. and Myasnikov, E.},
     title = {Copy - Move Detection Algorithm Efficiency Increase Using Binary Space Partitioning Trees},
     journal = {Information Technology and Nanotechnolog},
     year = {2016}}
    
  143. A. Kuznetsov & V. Myasnikov
    A Copy-move Detection Algorithm Using Binary Gradient Contours
    Image Analysis and Recognition, Springer, 2016
    DOI: 10.1007/978-3-319-41501-7_40
    BibTeX
    @article{Kuznetsov2016c,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {A Copy-move Detection Algorithm Using Binary Gradient Contours},
     journal = {Image Analysis and Recognition},
     publisher = {Springer},
     year = {2016}}
    
  144. A.V. Kuznetsov & V.V. Myasnikov
    New Algorithms for Verifying the Consistency between Satellite Images and Survey Conditions
    Pattern Recognition and Image Analysis, Springer, 2016, Vol. 26(3), pp. 593
    DOI: 10.1134/S1054661816030135
    BibTeX
    @article{Kuznetsov2016a,
     author = {Kuznetsov, A. V. and Myasnikov, V. V.},
     title = {New Algorithms for Verifying the Consistency between Satellite Images and Survey Conditions},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2016},
     volume = {26},
     number = {3},
     pages = {593}}
    
  145. A. Lawgely & F. Khelifi
    Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2620280
    BibTeX
    @article{Lawgely2016,
     author = {Lawgely, A. and Khelifi, F.},
     title = {Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  146. H.-Y. Lee
    Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering
    2016
    BibTeX
    @article{Lee2016c,
     author = {Lee, Hae-Yeoun},
     title = {Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering},
     year = {2016}}
    
  147. J.-H. Lee
    Camera Identification of Dibr-based Stereoscopic Image Using Sensor Pattern Noise
    Journal of the Korea Institute of Military Science and Technology, The Korea Institute of Military Science and Technology, 2016, Vol. 19(1), pp. 66-75
    DOI: 10.9766/KIMST.2016.19.1.066
    BibTeX
    @article{Lee2016,
     author = {Lee, Jun-Hee},
     title = {Camera Identification of Dibr-based Stereoscopic Image Using Sensor Pattern Noise},
     journal = {Journal of the Korea Institute of Military Science and Technology},
     publisher = {The Korea Institute of Military Science and Technology},
     year = {2016},
     volume = {19},
     number = {1},
     pages = {66--75}}
    
  148. S. Lee, Y. Lee & S. Lee
    A Study on the Evidence Investigation of Forged/modulated Time-stamp at iOS(iPhone, iPad)
    KIPS Transactions on Computer and Communication Systems, Korea Information Processing Society, 2016, Vol. 5(7), pp. 173-180
    DOI: 10.3745/KTCCS.2016.5.7.173
    BibTeX
    @article{Lee2016a,
     author = {Lee, Sanghyun and Lee, Yunho and Lee, Sangjin},
     title = {A Study on the Evidence Investigation of Forged/modulated Time-stamp at iOS(iPhone, iPad)},
     journal = {KIPS Transactions on Computer and Communication Systems},
     publisher = {Korea Information Processing Society},
     year = {2016},
     volume = {5},
     number = {7},
     pages = {173--180}}
    
  149. S.-H. Lee, D.-H. Kim & H.Y. Lee
    Video Acquisition Device Identification using Sensor Pattern Noise
    International Journal of Applied Engineering Research, 2016
    BibTeX
    @article{Lee2016b,
     author = {Lee, Sang-Hyeong and Kim, Dong-Hyun and Lee, Hae Yeoun},
     title = {Video Acquisition Device Identification using Sensor Pattern Noise},
     journal = {International Journal of Applied Engineering Research},
     year = {2016}}
    
  150. H. Li, A.C. Kot & L. Li
    Color Space Identification from Single Images
    Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)
    2016, pp. 1774-1777
    DOI: 10.1109/ISCAS.2016.7538912
    BibTeX
    @inproceedings{Li2016c,
     author = {Li, H. and Kot, A. C. and Li, L.},
     title = {Color Space Identification from Single Images},
     booktitle = {Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)},
     year = {2016},
     pages = {1774--1777}}
    
  151. H. Li, W. Luo, X. Qiu & J. Huang
    Identification of Various Image Operations Using Residual-based Features
    IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TCSVT.2016.2599849
    BibTeX
    @article{Li2016d,
     author = {Li, H. and Luo, W. and Qiu, X. and Huang, J.},
     title = {Identification of Various Image Operations Using Residual-based Features},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  152. J. Li, Q. Lin, C. Yu, X. Ren & P. Li
    A Qdct- and Svd-based Color Image Watermarking Scheme Using an Optimized Encrypted Binary Computer-generated Hologram
    Soft Computing, Springer, 2016, pp. 1
    DOI: 10.1007/s00500-016-2320-x
    BibTeX
    @article{Li2016b,
     author = {Li, Jianzhong and Lin, Qun and Yu, Chuying and Ren, Xuechang and Li, Ping},
     title = {A Qdct- and Svd-based Color Image Watermarking Scheme Using an Optimized Encrypted Binary Computer-generated Hologram},
     journal = {Soft Computing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  153. J. Li, F. Yang, W. Lu & W. Sun
    Keypoint-based Copy-move Detection Scheme by Adopting Mscrs and Improved Feature Matching
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3967-0
    BibTeX
    @article{Li2016a,
     author = {Li, Jingwei and Yang, Fan and Lu, Wei and Sun, Wei},
     title = {Keypoint-based Copy-move Detection Scheme by Adopting Mscrs and Improved Feature Matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  154. R. Li, R. Ni & Y. Zhao
    An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_10
    BibTeX
    @article{Li2016f,
     author = {Li, Ruihan and Ni, Rongrong and Zhao, Yao},
     title = {An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  155. Y. Li & J. Zhou
    Image copy-move forgery detection using hierarchical feature point matching
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2016, pp. 1-4
    DOI: 10.1109/APSIPA.2016.7820758
    BibTeX
    @inproceedings{Li2016g,
     author = {Li, Y. and Zhou, J.},
     title = {Image copy-move forgery detection using hierarchical feature point matching},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2016},
     pages = {1--4}}
    
  156. Y. Li, J. Zhou, A. Cheng, X. Liu & Y.Y. Tang
    SIFT Keypoint Removal and Injection Via Convex Relaxation
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(8), pp. 1722-1735
    DOI: 10.1109/TIFS.2016.2553645
    BibTeX
    @article{Li2016,
     author = {Li, Y. and Zhou, J. and Cheng, A. and Liu, X. and Tang, Y. Y.},
     title = {SIFT Keypoint Removal and Injection Via Convex Relaxation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {8},
     pages = {1722--1735}}
    
  157. P. Lin, Y. Gan, J. Young, J. Zhao & H. Lian
    Applying Polar Sine Transform for Detecting Copy-move Forgery
    Energy Science and Applied Technology ESAT 2016, 2016
    BibTeX
    @article{Lin2016d,
     author = {Lin, P. and Gan, Y. and Young, J. and Zhao, J. and Lian, H.},
     title = {Applying Polar Sine Transform for Detecting Copy-move Forgery},
     journal = {Energy Science and Applied Technology ESAT 2016},
     year = {2016}}
    
  158. X. Lin & C. Li
    Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
    DOI: 10.1109/TIFS.2015.2478748
    BibTeX
    @article{Lin2016,
     author = {Lin, X. and Li, C.},
     title = {Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {126--140}}
    
  159. X. Lin & C.T. Li
    Enhancing Sensor Pattern Noise Via Filtering Distortion Removal
    IEEE Signal Processing Letters, 2016, Vol. 23(3), pp. 381-385
    DOI: 10.1109/LSP.2016.2521349
    BibTeX
    @article{Lin2016a,
     author = {Lin, X. and Li, C. T.},
     title = {Enhancing Sensor Pattern Noise Via Filtering Distortion Removal},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {3},
     pages = {381--385}}
    
  160. X. Lin & C.T. Li
    Refining PRNU-based Detection of Image Forgeries
    Proc. Digital Media Industry Academic Forum (DMIAF)
    2016, pp. 222-226
    DOI: 10.1109/DMIAF.2016.7574937
    BibTeX
    @inproceedings{Lin2016b,
     author = {Lin, X. and Li, C. T.},
     title = {Refining PRNU-based Detection of Image Forgeries},
     booktitle = {Proc. Digital Media Industry Academic Forum (DMIAF)},
     year = {2016},
     pages = {222--226}}
    
  161. X. Lin & C.T. Li
    Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
    DOI: 10.1109/TIFS.2015.2478748
    BibTeX
    @article{Lin2016c,
     author = {Lin, X. and Li, C. T.},
     title = {Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {126--140}}
    
  162. X. Lin & C.T. Li
    Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
    DOI: 10.1109/TIFS.2015.2478748
    BibTeX
    @article{Lin2016f,
     author = {Lin, X. and Li, C. T.},
     title = {Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {126--140}}
    
  163. X. Lin & C.-T. Li
    Image provenance inference through content-based device fingerprint analysis
    Chapter 9
    2016
    BibTeX
    @electronic{Lin2016e,
     author = {Lin, Xufeng and Li, Chang-Tsun},
     title = {Image provenance inference through content-based device fingerprint analysis},
     year = {2016}}
    
  164. X. Lin, S.L. Wang, W.J. Huang & J.Y. Lai
    An Experimental Study on Block DCT Coefficient Analysis for Image Splicing Detection
    Proc. IEEE First Int. Conf. Data Science in Cyberspace (DSC)
    2016, pp. 69-73
    DOI: 10.1109/DSC.2016.38
    BibTeX
    @inproceedings{Lin2016g,
     author = {Lin, X. and Wang, S. L. and Huang, W. J. and Lai, J. Y.},
     title = {An Experimental Study on Block DCT Coefficient Analysis for Image Splicing Detection},
     booktitle = {Proc. IEEE First Int. Conf. Data Science in Cyberspace (DSC)},
     year = {2016},
     pages = {69--73}}
    
  165. A. Liu, Z. Zhao, C. Zhang & Y. Su
    Smooth filtering identification based on convolutional neural networks
    Multimedia Tools and Applications, Springer Nature, 2016
    DOI: 10.1007/s11042-016-4251-z
    BibTeX
    @article{Liu2016a,
     author = {Liu, Anan and Zhao, Zhengyu and Zhang, Chengqian and Su, Yuting},
     title = {Smooth filtering identification based on convolutional neural networks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2016}}
    
  166. Q. Liu
    Exposing Seam Carving Forgery under Recompression Attacks by Hybrid Large Feature Mining
    International Conference on Pattern Recognition, At Cancun
    2016
    BibTeX
    @conference{Liu2016,
     author = {Liu, Qingzhong},
     title = {Exposing Seam Carving Forgery under Recompression Attacks by Hybrid Large Feature Mining},
     booktitle = {International Conference on Pattern Recognition, At Cancun},
     year = {2016}}
    
  167. Q. Liu, A.H. Sung, B. Zhou & M. Qiao
    Exposing Inpainting Forgery in JPEG Images under Recompression Attacks
    Proc. 15th IEEE Int. Conf. Machine Learning and Applications (ICMLA)
    2016, pp. 164-169
    DOI: 10.1109/ICMLA.2016.0035
    BibTeX
    @inproceedings{Liu2016b,
     author = {Liu, Q. and Sung, A. H. and Zhou, B. and Qiao, M.},
     title = {Exposing Inpainting Forgery in JPEG Images under Recompression Attacks},
     booktitle = {Proc. 15th IEEE Int. Conf. Machine Learning and Applications (ICMLA)},
     year = {2016},
     pages = {164--169}}
    
  168. H. Luan & N.F. Law
    A novel dual-threshold SIFT-based copy-move forgery detection
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2016, pp. 1-5
    DOI: 10.1109/APSIPA.2016.7820872
    BibTeX
    @inproceedings{Luan2016,
     author = {Luan, H. and Law, N. F.},
     title = {A novel dual-threshold SIFT-based copy-move forgery detection},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2016},
     pages = {1--5}}
    
  169. T. Mahmood, T. Nawaz, A. Irtaza, R. Ashraf, M. Shah & M.T. Mahmood
    Copy-move Forgery Detection Technique for Forensic Analysis in Digital Images
    Mathematical Problems in Engineering, 2016
    DOI: 10.1109/icet.2015.7389169
    BibTeX
    @article{Mahmood2016,
     author = {Mahmood, Toqeer and Nawaz, Tabassam and Irtaza, Aun and Ashraf, Rehan and Shah, Mohsin and Mahmood, Muhammad Tariq},
     title = {Copy-move Forgery Detection Technique for Forensic Analysis in Digital Images},
     journal = {Mathematical Problems in Engineering},
     year = {2016}}
    
  170. T. Mahmood, T. Nawaz, Z. Mehmood, Z. Khan, M. Shah & R. Ashraf
    Forensic analysis of copy-move forgery in digital images using the stationary wavelets
    Proc. Sixth Int. Conf. Innovative Computing Technology (INTECH)
    2016, pp. 578-583
    DOI: 10.1109/INTECH.2016.7845040
    BibTeX
    @inproceedings{Mahmood2016a,
     author = {Mahmood, T. and Nawaz, T. and Mehmood, Z. and Khan, Z. and Shah, M. and Ashraf, R.},
     title = {Forensic analysis of copy-move forgery in digital images using the stationary wavelets},
     booktitle = {Proc. Sixth Int. Conf. Innovative Computing Technology (INTECH)},
     year = {2016},
     pages = {578--583}}
    
  171. K.W. Mahmoud & A.H.A. Al-Rukab
    Moment Based Copy Move Forgery Detection Methods
    International Journal of Computer Science and Information Security (IJCSIS), 2016
    BibTeX
    @article{Mahmoud2016,
     author = {Mahmoud, Khaled W. and Al-Rukab, Arwa Husien Abu},
     title = {Moment Based Copy Move Forgery Detection Methods},
     journal = {International Journal of Computer Science and Information Security (IJCSIS)},
     year = {2016}}
    
  172. A. Malviya & S. Ladhake
    An Image Forensic Technique for Detection of Copy-move Forgery in Digital Image
    Security in Computing and Communications
    Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_28
    BibTeX
    @incollection{Malviya2016a,
     author = {Malviya, Ashwini and Ladhake, Siddharth},
     title = {An Image Forensic Technique for Detection of Copy-move Forgery in Digital Image},
     booktitle = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  173. A.V. Malviya & S.A. Ladhake
    Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram
    Procedia Computer Science, 2016, Vol. 79, pp. 383-390
    DOI: 10.1016/j.procs.2016.03.050
    BibTeX
    @article{Malviya2016,
     author = {Malviya, Ashwini V. and Ladhake, Siddharth A.},
     title = {Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {79},
     pages = {383--390}}
    
  174. A.V. Malviya & S.A. Ladhake
    Region duplication detection using color histogram and moments in digital image
    Proc. Int. Conf. Inventive Computation Technologies (ICICT)
    2016, Vol. 1, pp. 1-4
    DOI: 10.1109/INVENTIVE.2016.7823199
    BibTeX
    @inproceedings{Malviya2016b,
     author = {Malviya, A. V. and Ladhake, S. A.},
     title = {Region duplication detection using color histogram and moments in digital image},
     booktitle = {Proc. Int. Conf. Inventive Computation Technologies (ICICT)},
     year = {2016},
     volume = {1},
     pages = {1--4}}
    
  175. S.S. Mangat & H. Kaur
    Improved copy-move forgery detection in image by feature extraction with KPCA and adaptive method
    Proc. 2nd Int. Conf. Next Generation Computing Technologies (NGCT)
    2016, pp. 694-703
    DOI: 10.1109/NGCT.2016.7877501
    BibTeX
    @inproceedings{Mangat2016,
     author = {Mangat, S. S. and Kaur, H.},
     title = {Improved copy-move forgery detection in image by feature extraction with KPCA and adaptive method},
     booktitle = {Proc. 2nd Int. Conf. Next Generation Computing Technologies (NGCT)},
     year = {2016},
     pages = {694--703}}
    
  176. V.M. Manikandan & V. Masilamani
    A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
    ACM, 2016, pp. 611-618
    DOI: 10.1145/3009977.3009987
    BibTeX
    @inproceedings{Manikandan2016,
     author = {Manikandan, V. M. and Masilamani, V.},
     title = {A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing},
     publisher = {ACM},
     year = {2016},
     pages = {611--618}}
    
  177. V.T. Manu & B.M. Mehtre
    Detection of Copy-move Forgery in Images Using Segmentation and SURF
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_55
    BibTeX
    @article{Manu2016,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Detection of Copy-move Forgery in Images Using Segmentation and SURF},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  178. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    A Study of Co-occurrence Based Local Features for Camera Model Identification
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3663-0
    BibTeX
    @article{Marra2016,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {A Study of Co-occurrence Based Local Features for Camera Model Identification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  179. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Correlation clustering for PRNU-based blind image source identification
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823910
    BibTeX
    @inproceedings{Marra2016a,
     author = {Marra, F. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Correlation clustering for PRNU-based blind image source identification},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  180. M. Mathai, D. Rajan & S. Emmanuel
    Video Forgery Detection and Localization Using Normalized Cross-correlation of Moment Features
    2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)
    2016, pp. 149-152
    DOI: 10.1109/SSIAI.2016.7459197
    BibTeX
    @inproceedings{Mathai2016,
     author = {Mathai, M. and Rajan, D. and Emmanuel, S.},
     title = {Video Forgery Detection and Localization Using Normalized Cross-correlation of Moment Features},
     booktitle = {2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)},
     year = {2016},
     pages = {149--152}}
    
  181. O. Mayer & M. Stamm
    Improved Forgery Detection with Lateral Chromatic Aberration
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2024-2028
    DOI: 10.1109/ICASSP.2016.7472032
    BibTeX
    @inproceedings{Mayer2016,
     author = {Mayer, O. and Stamm, M.},
     title = {Improved Forgery Detection with Lateral Chromatic Aberration},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2024--2028}}
    
  182. A. Mazumdar & P.K. Bora
    Exposing Splicing Forgeries in Digital Images Through Dichromatic Plane Histogram Discrepancies
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
    ACM, 2016, pp. 621-628
    DOI: 10.1145/3009977.3010032
    BibTeX
    @inproceedings{Mazumdar2016,
     author = {Mazumdar, Aniruddha and Bora, Prabin Kumar},
     title = {Exposing Splicing Forgeries in Digital Images Through Dichromatic Plane Histogram Discrepancies},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing},
     publisher = {ACM},
     year = {2016},
     pages = {621--628}}
    
  183. A. Mehrish, A.V. Subramanyam & S. Emmanuel
    Sensor Pattern Noise Estimation Using Probabilistically Estimated Raw Values
    IEEE Signal Processing Letters, 2016, Vol. 23(5), pp. 693-697
    DOI: 10.1109/LSP.2016.2549059
    BibTeX
    @article{Mehrish2016,
     author = {Mehrish, A. and Subramanyam, A. V. and Emmanuel, S.},
     title = {Sensor Pattern Noise Estimation Using Probabilistically Estimated Raw Values},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {5},
     pages = {693--697}}
    
  184. S. Milani, M. Fontana, P. Bestagini & S. Tubaro
    Phylogenetic Analysis of Near-duplicate Images Using Processing Age Metrics
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2054-2058
    DOI: 10.1109/ICASSP.2016.7472038
    BibTeX
    @inproceedings{Milani2016,
     author = {Milani, S. and Fontana, M. and Bestagini, P. and Tubaro, S.},
     title = {Phylogenetic Analysis of Near-duplicate Images Using Processing Age Metrics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2054--2058}}
    
  185. S. Milani & E. Tronca
    Improving three-dimensional reconstruction of buildings from web-harvested images using forensic clues
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 26(1), pp. 011009
    DOI: 10.1117/1.jei.26.1.011009
    BibTeX
    @article{Milani2016a,
     author = {Milani, Simone and Tronca, Enrico},
     title = {Improving three-dimensional reconstruction of buildings from web-harvested images using forensic clues},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {26},
     number = {1},
     pages = {011009}}
    
  186. S. Milani & E. Tronca
    Improving Three-dimensional Reconstruction of Buildings from Web-harvested Images Using Forensic Clues
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 26(1), pp. 011009
    DOI: 10.1117/1.jei.26.1.011009
    BibTeX
    @article{Milani2016b,
     author = {Milani, Simone and Tronca, Enrico},
     title = {Improving Three-dimensional Reconstruction of Buildings from Web-harvested Images Using Forensic Clues},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {26},
     number = {1},
     pages = {011009}}
    
  187. A.V. Mire, S.B. Dhok, N.J. Mistry & P.D. Porey
    Tampering Localization in Digital Image Using First Two Digit Probability Features
    Satapathy, C. S., Mandal, K. J., Udgata, K. S. & Bhateja, V. (ed.)
    Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3
    Chapter Tampering Localization in Digital Image Using First Two Digit Probability Features
    Springer India, 2016, pp. 133-141
    DOI: 10.1007/978-81-322-2757-1_15
    BibTeX
    @inbook{Mire2016,
     author = {Mire, Archana V. and Dhok, Sanjay B. and Mistry, Narendra J. and Porey, Prakash D.},
     title = {Tampering Localization in Digital Image Using First Two Digit Probability Features},
     booktitle = {Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3},
     publisher = {Springer India},
     year = {2016},
     pages = {133--141}}
    
  188. H. Moradi-Gharghani & M. Nasri
    A new block-based copy-move forgery detection method in digital images
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1208-1212
    DOI: 10.1109/ICCSP.2016.7754344
    BibTeX
    @inproceedings{Moradi-Gharghani2016,
     author = {Moradi-Gharghani, H. and Nasri, M.},
     title = {A new block-based copy-move forgery detection method in digital images},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1208--1212}}
    
  189. G.S. Morrison
    Special issue on measuring and reporting the precision of forensic likelihood ratios: Introduction to the debate
    Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 371-373
    DOI: 10.1016/j.scijus.2016.05.002
    BibTeX
    @article{Morrison2016,
     author = {Morrison, Geoffrey Stewart},
     title = {Special issue on measuring and reporting the precision of forensic likelihood ratios: Introduction to the debate},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {56},
     number = {5},
     pages = {371--373}}
    
  190. G. Muzaffer, O. Makul, B. Ustubioglu & G. Ulutas
    Copy Move Forgery Detection Using Gabor Filter and Orb
    Proceedings of 2016International Conference on Image Processing, Production and Computer Science (ICIPCS'2016)
    2016
    BibTeX
    @conference{Muzaffer2016,
     author = {Muzaffer, Gul and Makul, Ozge and Ustubioglu, Beste and Ulutas, Guzin},
     title = {Copy Move Forgery Detection Using Gabor Filter and Orb},
     booktitle = {Proceedings of 2016International Conference on Image Processing, Production and Computer Science (ICIPCS'2016)},
     year = {2016}}
    
  191. V.P. Nampoothiri & N. Sugitha
    Digital Image Forgery --- A Threaten to Digital Forensics
    Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
    2016, pp. 1-6
    DOI: 10.1109/ICCPCT.2016.7530370
    BibTeX
    @inproceedings{Nampoothiri2016,
     author = {Nampoothiri, V. P. and Sugitha, N.},
     title = {Digital Image Forgery --- A Threaten to Digital Forensics},
     booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit},
     year = {2016},
     pages = {1--6}}
    
  192. V.P. Nampoothiri & N. Sugitha
    Digital image forgery --- A threaten to digital forensics
    Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
    2016, pp. 1-6
    DOI: 10.1109/ICCPCT.2016.7530370
    BibTeX
    @inproceedings{Nampoothiri2016a,
     author = {Nampoothiri, V. P. and Sugitha, N.},
     title = {Digital image forgery --- A threaten to digital forensics},
     booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit},
     year = {2016},
     pages = {1--6}}
    
  193. H.C. Nguyen
    A Machine Learning Based Technique for Detecting Digital Image Resampling
    Nguyen, T. N., Trawiʼnski, B., Fujita, H. & Hong, T.-P. (ed.)
    Intelligent Information and Database Systems: 8th Asian Conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, Proceedings, Part II
    Chapter A Machine Learning Based Technique for Detecting Digital Image Resampling
    Springer Berlin Heidelberg, 2016, pp. 75-84
    DOI: 10.1007/978-3-662-49390-8_7
    BibTeX
    @inbook{Nguyen2016,
     author = {Nguyen, Hieu Cuong},
     title = {A Machine Learning Based Technique for Detecting Digital Image Resampling},
     booktitle = {Intelligent Information and Database Systems: 8th Asian Conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, Proceedings, Part II},
     publisher = {Springer Berlin Heidelberg},
     year = {2016},
     pages = {75--84}}
    
  194. H.H. Nguyen, H.-Q. Nguyen-Son, T.D. Nguyen & I. Echizen
    Discriminating between Computer-generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy
    Digital-Forensics and Watermarking
    Digital-Forensics and Watermarking, Springer, 2016, pp. 39-50
    DOI: 10.1007/978-3-319-31960-5_4
    BibTeX
    @article{Nguyen2016a,
     author = {Nguyen, Huy H. and Nguyen-Son, Hoang-Quoc and Nguyen, Thuc D. and Echizen, Isao},
     title = {Discriminating between Computer-generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy},
     booktitle = {Digital-Forensics and Watermarking},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016},
     pages = {39--50}}
    
  195. R.M.H. Nguyen & M.S. Brown
    RAW Image Reconstruction Using a Self-Contained sRGB-JPEG Image with Only 64 KB Overhead
    Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
    2016, pp. 1655-1663
    DOI: 10.1109/CVPR.2016.183
    BibTeX
    @inproceedings{Nguyen2016b,
     author = {Nguyen, R. M. H. and Brown, M. S.},
     title = {RAW Image Reconstruction Using a Self-Contained sRGB-JPEG Image with Only 64 KB Overhead},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)},
     year = {2016},
     pages = {1655--1663}}
    
  196. R. Nithiya & S. Veluchamy
    Key point descriptor based copy and move image forgery detection system
    Proc. Second Int. Conf. Science Technology Engineering and Management (ICONSTEM)
    2016, pp. 577-581
    DOI: 10.1109/ICONSTEM.2016.7560959
    BibTeX
    @inproceedings{Nithiya2016,
     author = {Nithiya, R. and Veluchamy, S.},
     title = {Key point descriptor based copy and move image forgery detection system},
     booktitle = {Proc. Second Int. Conf. Science Technology Engineering and Management (ICONSTEM)},
     year = {2016},
     pages = {577--581}}
    
  197. M.S.Y. Nuchu
    Compressed Fragile Sensor Noise Fingerprint for Smartphone Identification
    Binghamton University State University of New York, Binghamton University State University of New York, 2016
    BibTeX
    @mastersthesis{Nuchu2016,
     author = {Nuchu, Madhu Sudhan Yadav},
     title = {Compressed Fragile Sensor Noise Fingerprint for Smartphone Identification},
     school = {Binghamton University State University of New York},
     year = {2016}}
    
  198. A.A. de Oliveira, P. Ferrara, A.D. Rosa, A. Piva, M. Barni, S. Goldenstein, Z. Dias & A. Rocha
    Multiple Parenting Phylogeny Relationships in Digital Images
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(2), pp. 328-343
    DOI: 10.1109/TIFS.2015.2493989
    BibTeX
    @article{Oliveira2016,
     author = {de Oliveira, A. A. and Ferrara, P. and Rosa, A. De and Piva, A. and Barni, Mauro and Goldenstein, S. and Dias, Z. and Rocha, A.},
     title = {Multiple Parenting Phylogeny Relationships in Digital Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {2},
     pages = {328--343}}
    
  199. R.S. Oommen, M. Jayamohan & S. Sruthy
    Scale Invariant Detection of Copy-move Forgery Using Fractal Dimension and Singular Values
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_47
    BibTeX
    @article{Oommen2016,
     author = {Oommen, Rani Susan and Jayamohan, M. and Sruthy, S.},
     title = {Scale Invariant Detection of Copy-move Forgery Using Fractal Dimension and Singular Values},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  200. R.S. Oommen, M. Jayamohan & S. Sruthy
    Using Fractal Dimension and Singular Values for Image Forgery Detection and Localization
    Procedia Technology, Elsevier BV, 2016, Vol. 24, pp. 1452-1459
    DOI: 10.1016/j.protcy.2016.05.176
    BibTeX
    @article{Oommen2016a,
     author = {Oommen, Rani Susan and Jayamohan, M. and Sruthy, S.},
     title = {Using Fractal Dimension and Singular Values for Image Forgery Detection and Localization},
     journal = {Procedia Technology},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {24},
     pages = {1452--1459}}
    
  201. A.L.S. Orozco, J.R. Corripio, D.M.A. González, L.J.G. Villalba & J. Hernandez-Castro
    Theia: A Tool for the Forensic Analysis of Mobile Devices Pictures
    Computing, Springer Science mathplus Business Media, 2016, pp. 1-36
    DOI: 10.1007/s00607-015-0482-5
    BibTeX
    @article{Orozco2016,
     author = {Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and González, David Manuel Arenas and Villalba, Luis Javier Garc\ia and Hernandez-Castro, Julio},
     title = {Theia: A Tool for the Forensic Analysis of Mobile Devices Pictures},
     journal = {Computing},
     publisher = {Springer Science mathplus Business Media},
     year = {2016},
     pages = {1--36}}
    
  202. J. Ouyang, Y. Liu & H. Shu
    Robust Hashing for Image Authentication Using SIFT Feature and Quaternion Zernike Moments
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-015-3225-x
    BibTeX
    @article{Ouyang2016,
     author = {Ouyang, Junlin and Liu, Yizhi and Shu, Huazhong},
     title = {Robust Hashing for Image Authentication Using SIFT Feature and Quaternion Zernike Moments},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  203. R.C. Pandey, S. Prasad, S.K. Singh & K.K. Shukla
    Image Splicing Detection Using HMRF-GMM Based Segmentation Technique and Local Noise Variances
    INROADS- An International Journal of Jaipur National University, Diva Enterprises Private Limited, 2016, Vol. 5(1s), pp. 223
    DOI: 10.5958/2277-4912.2016.00043.6
    BibTeX
    @article{Pandey2016a,
     author = {Pandey, Ramesh Chand and Prasad, Shiv and Singh, Sanjay Kumar and Shukla, K. K.},
     title = {Image Splicing Detection Using HMRF-GMM Based Segmentation Technique and Local Noise Variances},
     journal = {INROADS- An International Journal of Jaipur National University},
     publisher = {Diva Enterprises Private Limited},
     year = {2016},
     volume = {5},
     number = {1s},
     pages = {223}}
    
  204. R.C. Pandey, S.K. Singh & K.K. Shukla
    Passive Forensics in Image and Video Using Noise Features: A Review
    Digital Investigation, Elsevier BV, 2016, Vol. 19, pp. 1-28
    DOI: 10.1016/j.diin.2016.08.002
    BibTeX
    @article{Pandey2016,
     author = {Pandey, Ramesh C. and Singh, Sanjay K. and Shukla, Kaushal K.},
     title = {Passive Forensics in Image and Video Using Noise Features: A Review},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {19},
     pages = {1--28}}
    
  205. P.P. Panzade, C.S. Prakash & S. Maheshkar
    Copy-move forgery detection by using HSV preprocessing and keypoint extraction
    Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel
    2016, pp. 264-269
    DOI: 10.1109/PDGC.2016.7913156
    BibTeX
    @inproceedings{Panzade2016,
     author = {Panzade, P. P. and Prakash, C. S. and Maheshkar, S.},
     title = {Copy-move forgery detection by using HSV preprocessing and keypoint extraction},
     booktitle = {Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel},
     year = {2016},
     pages = {264--269}}
    
  206. C.-S. Park, C. Kim, J. Lee & G.-R. Kwon
    Rotation and Scale Invariant Upsampled Log-polar Fourier Descriptor for Copy-move Forgery Detection
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3575-z
    BibTeX
    @article{Park2016,
     author = {Park, Chun-Su and Kim, Changjae and Lee, Jihoon and Kwon, Goo-Rak},
     title = {Rotation and Scale Invariant Upsampled Log-polar Fourier Descriptor for Copy-move Forgery Detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  207. J.-S. Park, D.-K. Hyun, J.-U. Hou, D.-G. Kim & H.-K. Lee
    Detecting Digital Image Forgery in Near-infrared Image of Cctv
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3871-7
    BibTeX
    @article{Park2016b,
     author = {Park, Jin-Seok and Hyun, Dai-Kyung and Hou, Jong-Uk and Kim, Do-Guk and Lee, Heung-Kyu},
     title = {Detecting Digital Image Forgery in Near-infrared Image of Cctv},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  208. T.H. Park, J.G. Han, Y.H. Moon & I.K. Eom
    Image Splicing Detection Based on Inter-scale 2d Joint Characteristic Function Moments in Wavelet Domain
    EURASIP Journal on Image and Video Processing, 2016, Vol. 2016(1), pp. 1-10
    DOI: 10.1186/s13640-016-0136-3
    BibTeX
    @article{Park2016a,
     author = {Park, Tae Hee and Han, Jong Goo and Moon, Yong Ho and Eom, Il Kyu},
     title = {Image Splicing Detection Based on Inter-scale 2d Joint Characteristic Function Moments in Wavelet Domain},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2016},
     volume = {2016},
     number = {1},
     pages = {1--10}}
    
  209. A. Parveen & A. Tayal
    An algorithm to detect the forged part in an image
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1486-1490
    DOI: 10.1109/ICCSP.2016.7754405
    BibTeX
    @inproceedings{Parveen2016,
     author = {Parveen, A. and Tayal, A.},
     title = {An algorithm to detect the forged part in an image},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1486--1490}}
    
  210. C. Pasquini, G. Boato, N. Alajlan & F.G.B.D. Natale
    A Deterministic Approach to Detect Median Filtering in 1D Data
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(7), pp. 1425-1437
    DOI: 10.1109/TIFS.2016.2530636
    BibTeX
    @article{Pasquini2016,
     author = {Pasquini, C. and Boato, G. and Alajlan, N. and Natale, F. G. B. De},
     title = {A Deterministic Approach to Detect Median Filtering in 1D Data},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {7},
     pages = {1425--1437}}
    
  211. A.B. Patankar, A. Sukhpal, S. Shetye & A. Shroff
    Copy move forgery detection
    Proc. Int. Conf. Workshop Electronics Telecommunication Engineering (ICWET 2016)
    2016, pp. 188-193
    DOI: 10.1049/cp.2016.1145
    BibTeX
    @inproceedings{Patankar2016,
     author = {Patankar, A. B. and Sukhpal, A. and Shetye, S. and Shroff, A.},
     title = {Copy move forgery detection},
     booktitle = {Proc. Int. Conf. Workshop Electronics Telecommunication Engineering (ICWET 2016)},
     year = {2016},
     pages = {188--193}}
    
  212. B. Peng, W. Wang, J. Dong & T. Tan
    Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3932-3936
    DOI: 10.1109/ICIP.2016.7533097
    BibTeX
    @inproceedings{Peng2016,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3932--3936}}
    
  213. B. Peng, W. Wang, J. Dong & T. Tan
    Optimized 3D Lighting Environment Estimation for Image Forgery Detection
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2623589
    BibTeX
    @article{Peng2016a,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Optimized 3D Lighting Environment Estimation for Image Forgery Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  214. F. Pérez-González, M. Masciopinto, I. González-Iglesias & P. Comesaña
    Fast Sequential Forensic Detection of Camera Fingerprint
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3902-3906
    DOI: 10.1109/ICIP.2016.7533091
    BibTeX
    @inproceedings{Perez-Gonzalez2016,
     author = {Pérez-González, F. and Masciopinto, M. and González-Iglesias, I. and Comesaña, P.},
     title = {Fast Sequential Forensic Detection of Camera Fingerprint},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3902--3906}}
    
  215. C.S. Prakash & S. Maheshkar
    Copy-move forgery detection using lexicographical sort
    Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel
    2016, pp. 149-153
    DOI: 10.1109/PDGC.2016.7913133
    BibTeX
    @inproceedings{Prakash2016,
     author = {Prakash, C. S. and Maheshkar, S.},
     title = {Copy-move forgery detection using lexicographical sort},
     booktitle = {Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel},
     year = {2016},
     pages = {149--153}}
    
  216. S. Prasad & B. Ramkumar
    Passive copy-move forgery detection using SIFT, HOG and SURF features
    Proc. Information Communication Technology (RTEICT) 2016 IEEE Int. Conf. Recent Trends in Electronics
    2016, pp. 706-710
    DOI: 10.1109/RTEICT.2016.7807915
    BibTeX
    @inproceedings{Prasad2016,
     author = {Prasad, S. and Ramkumar, B.},
     title = {Passive copy-move forgery detection using SIFT, HOG and SURF features},
     booktitle = {Proc. Information Communication Technology (RTEICT) 2016 IEEE Int. Conf. Recent Trends in Electronics},
     year = {2016},
     pages = {706--710}}
    
  217. C.-M. Pun, B. Liu & X.-C. Yuan
    Multi-scale Noise Estimation for Image Splicing Forgery Detection
    Journal of Visual Communication and Image Representation, 2016, Vol. 38, pp. 195-206
    DOI: 10.1016/j.jvcir.2016.03.005
    BibTeX
    @article{Pun2016,
     author = {Pun, Chi-Man and Liu, Bo and Yuan, Xiao-Chen},
     title = {Multi-scale Noise Estimation for Image Splicing Forgery Detection},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2016},
     volume = {38},
     pages = {195--206}}
    
  218. K. Purohit & A.N. Rajagopalan
    Splicing Localization in Motion Blurred 3D Scenes
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3922-3926
    DOI: 10.1109/ICIP.2016.7533095
    BibTeX
    @inproceedings{Purohit2016,
     author = {Purohit, K. and Rajagopalan, A. N.},
     title = {Splicing Localization in Motion Blurred 3D Scenes},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3922--3926}}
    
  219. T. Qiao
    Statistical Detection for Digital Image Forensics
    University of technology of troyes, University of technology of troyes, 2016
    BibTeX
    @phdthesis{Qiao2016,
     author = {Qiao, Tong},
     title = {Statistical Detection for Digital Image Forensics},
     school = {University of technology of troyes},
     year = {2016}}
    
  220. C. Qin, P. Ji, J. Wang & C.-C. Chang
    Fragile image watermarking scheme based on VQ index sharing and self-embedding
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-015-3218-9
    BibTeX
    @article{Qin2016,
     author = {Qin, Chuan and Ji, Ping and Wang, Jinwei and Chang, Chin-Chen},
     title = {Fragile image watermarking scheme based on VQ index sharing and self-embedding},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  221. M. Ramya & P. Sridevi
    Mage Forgery Detection Using Improved SLIC
    International Research Journal of Engineering and Technology (IRJET), 2016, Vol. 3(12), pp. 1350-1356
    BibTeX
    @article{Ramya2016,
     author = {Ramya, M. and Sridevi, P.},
     title = {Mage Forgery Detection Using Improved SLIC},
     journal = {International Research Journal of Engineering and Technology (IRJET)},
     year = {2016},
     volume = {3},
     number = {12},
     pages = {1350--1356}}
    
  222. Q. Rao, J. Wang & L. Zhang
    Enhancing Source Camera Identification Based on Multiplicative Denoising Filter
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2016, pp. 983-988
    DOI: 10.1109/TrustCom.2016.0165
    BibTeX
    @inproceedings{Rao2016a,
     author = {Rao, Q. and Wang, J. and Zhang, L.},
     title = {Enhancing Source Camera Identification Based on Multiplicative Denoising Filter},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2016},
     pages = {983--988}}
    
  223. Y. Rao & J. Ni
    A deep learning approach to detection of splicing and copy-move forgeries in images
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823911
    BibTeX
    @inproceedings{Rao2016,
     author = {Rao, Y. and Ni, J.},
     title = {A deep learning approach to detection of splicing and copy-move forgeries in images},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  224. dos Reis & G.A.A. Costa
    Implementação Do Algoritmo De Detecção De Cópia/clonagem Na Análise Forense De Imagens Digitais
    Acta De Ciências E Saúde, 2016
    BibTeX
    @article{dosReis2016,
     author = {dos Reis and Costa, Gustavo Aranha Araújo},
     title = {Implementação Do Algoritmo De Detecção De Cópia/clonagem Na Análise Forense De Imagens Digitais},
     journal = {Acta De Ciências E Saúde},
     year = {2016}}
    
  225. J. Ren, J. Han & M. Dalla Mura
    Special issue on multimodal data fusion for multidimensional signal processing
    Multidimensional Systems and Signal Processing, Springer, 2016, Vol. 27(4), pp. 801
    DOI: 10.1007/s11045-016-0441-0
    BibTeX
    @article{Ren2016,
     author = {Ren, Jinchang and Han, Junwei and Dalla Mura, Mauro},
     title = {Special issue on multimodal data fusion for multidimensional signal processing},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2016},
     volume = {27},
     number = {4},
     pages = {801}}
    
  226. Y. Ren, J. Shen, Y. Zheng, J. Wang & H.-C. Chao
    Efficient data integrity auditing for storage security in mobile health cloud
    Peer-to-Peer Networking and Applications, Springer, 2016, Vol. 9(5), pp. 854
    DOI: 10.1007/s12083-015-0346-y
    BibTeX
    @article{Ren2016a,
     author = {Ren, Yongjun and Shen, Jian and Zheng, Yuhui and Wang, Jin and Chao, Han-Chieh},
     title = {Efficient data integrity auditing for storage security in mobile health cloud},
     journal = {Peer-to-Peer Networking and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {9},
     number = {5},
     pages = {854}}
    
  227. K.H. Rhee
    Downscaling Forgery Detection Using Pixel Value's Gradients of Digital Image
    Journal of the Institute of Electronics and Information Engineers, 2016
    DOI: 10.5573/ieie.2016.53.2.047
    BibTeX
    @article{Rhee2016,
     author = {Rhee, Kang Hyeon},
     title = {Downscaling Forgery Detection Using Pixel Value's Gradients of Digital Image},
     journal = {Journal of the Institute of Electronics and Information Engineers},
     year = {2016}}
    
  228. K.H. Rhee
    Gaussian filtering detection using band pass residual and contrast of forgery image
    Proc. Electronics and Mobile Communication Conf 2016 IEEE 7th Annual Information Technology (IEMCON)
    2016, pp. 1-4
    DOI: 10.1109/IEMCON.2016.7746310
    BibTeX
    @inproceedings{Rhee2016a,
     author = {Rhee, K. H.},
     title = {Gaussian filtering detection using band pass residual and contrast of forgery image},
     booktitle = {Proc. Electronics and Mobile Communication Conf 2016 IEEE 7th Annual Information Technology (IEMCON)},
     year = {2016},
     pages = {1--4}}
    
  229. K.H. Rhee
    Median Filtering Detection Using Variation of Neighboring Line Pairs for Image Forensic
    Proc. IEEE 5th Int Consumer Electronics - Berlin (ICCE-Berlin) Conf
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 25(5), pp. 103-107
    DOI: 10.1117/1.JEI.25.5.053039
    BibTeX
    @inproceedings{Rhee2016b,
     author = {Rhee, K. H.},
     title = {Median Filtering Detection Using Variation of Neighboring Line Pairs for Image Forensic},
     booktitle = {Proc. IEEE 5th Int Consumer Electronics - Berlin (ICCE-Berlin) Conf},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {25},
     number = {5},
     pages = {103--107}}
    
  230. P. Rota, E. Sangineto, V. Conotter & C. Pramerdorfer
    Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?
    Proc. 23rd Int. Conf. Pattern Recognition (ICPR)
    2016, pp. 2503-2508
    DOI: 10.1109/ICPR.2016.7900012
    BibTeX
    @inproceedings{Rota2016,
     author = {Rota, P. and Sangineto, E. and Conotter, V. and Pramerdorfer, C.},
     title = {Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?},
     booktitle = {Proc. 23rd Int. Conf. Pattern Recognition (ICPR)},
     year = {2016},
     pages = {2503--2508}}
    
  231. P. Rota, E. Sangineto, V. Conotter & C. Pramerdorfer
    Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?
    Proc. 23rd Int. Conf. Pattern Recognition (ICPR)
    2016, pp. 2503-2508
    DOI: 10.1109/ICPR.2016.7900012
    BibTeX
    @inproceedings{Rota2016a,
     author = {Rota, P. and Sangineto, E. and Conotter, V. and Pramerdorfer, C.},
     title = {Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?},
     booktitle = {Proc. 23rd Int. Conf. Pattern Recognition (ICPR)},
     year = {2016},
     pages = {2503--2508}}
    
  232. G.K. Saini & M. Mahajan
    Improvement in Copy-Move Forgery Detection Using Hybrid Approach
    International Journal of Modern Education & Computer Science, 2016
    BibTeX
    @article{Saini2016,
     author = {Saini, Gurmeet Kaur and Mahajan, Manish},
     title = {Improvement in Copy-Move Forgery Detection Using Hybrid Approach},
     journal = {International Journal of Modern Education & Computer Science},
     year = {2016}}
    
  233. N.S. Saji & R. Rajan
    Identification of source-enhanced composite images
    Proc. Int. Conf. Emerging Technological Trends (ICETT)
    2016, pp. 1-6
    DOI: 10.1109/ICETT.2016.7873666
    BibTeX
    @inproceedings{Saji2016,
     author = {Saji, N. S. and Rajan, R.},
     title = {Identification of source-enhanced composite images},
     booktitle = {Proc. Int. Conf. Emerging Technological Trends (ICETT)},
     year = {2016},
     pages = {1--6}}
    
  234. S. Salekin, R. Kushol & H. Kabir
    An Efficient Circular Block Approach for Copy-Move Forgery Detection
    IUT JOURNAL OF ENGINEERING AND TECHNOLOGY (JET), 2016, Vol. 12(2), pp. 9-20
    BibTeX
    @article{Salekin2016,
     author = {Salekin, Sirajus and Kushol, Rafsanjany and Kabir, Hasanul},
     title = {An Efficient Circular Block Approach for Copy-Move Forgery Detection},
     journal = {IUT JOURNAL OF ENGINEERING AND TECHNOLOGY (JET)},
     year = {2016},
     volume = {12},
     number = {2},
     pages = {9--20}}
    
  235. V.U. Sameer, S. Sugumaran & R. Naskar
    Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches
    Information Systems Security, Springer, 2016
    DOI: 10.1007/978-3-319-49806-5_22
    BibTeX
    @article{Sameer2016,
     author = {Sameer, Venkata Udaya and Sugumaran, S. and Naskar, Ruchira},
     title = {Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches},
     journal = {Information Systems Security},
     publisher = {Springer},
     year = {2016}}
    
  236. A.L. Sandoval Orozco, J.R. Corripio, L.J. García Villalba & J.C. Hernández Castro
    Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(12), pp. 7087
    DOI: 10.1007/s11042-015-2633-2
    BibTeX
    @article{SandovalOrozco2016,
     author = {Sandoval Orozco, Ana Lucila and Corripio, Jocelin Rosales and García Villalba, Luis Javier and Hernández Castro, Julio César},
     title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {12},
     pages = {7087}}
    
  237. O. Saurer, G. Baatz, K. Köser, L. Ladický & M. Pollefeys
    Image Based Geo-localization in the Alps
    International Journal of Computer Vision, Springer, 2016, Vol. 116(3), pp. 213
    DOI: 10.1007/s11263-015-0830-0
    BibTeX
    @article{Saurer2016,
     author = {Saurer, Olivier and Baatz, Georges and Köser, Kevin and Ladický, L’ubor and Pollefeys, Marc},
     title = {Image Based Geo-localization in the Alps},
     journal = {International Journal of Computer Vision},
     publisher = {Springer},
     year = {2016},
     volume = {116},
     number = {3},
     pages = {213}}
    
  238. O. Saurer, G. Baatz, K. Köser, L. Ladický & M. Pollefeys
    Image-based Large-scale Geo-localization in Mountainous Regions
    Large-Scale Visual Geo-Localization, Springer, 2016
    DOI: 10.1007/978-3-319-25781-5_11
    BibTeX
    @article{Saurer2016a,
     author = {Saurer, Olivier and Baatz, Georges and Köser, Kevin and Ladický, L’ubor and Pollefeys, Marc},
     title = {Image-based Large-scale Geo-localization in Mountainous Regions},
     journal = {Large-Scale Visual Geo-Localization},
     publisher = {Springer},
     year = {2016}}
    
  239. V. Schetinger, M. Iuliani, A. Piva & M.M. Oliveira
    Digital Image Forensics Vs. Image Composition: An Indirect Arms Race
    arXiv preprint arXiv:1601.03239, 2016
    DOI: 10.1109/wifs.2015.7368598
    BibTeX
    @article{Schetinger2016,
     author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.},
     title = {Digital Image Forensics Vs. Image Composition: An Indirect Arms Race},
     journal = {arXiv preprint arXiv:1601.03239},
     year = {2016}}
    
  240. V. Schetinger, M. Iuliani, A. Piva & M.M. Oliveira
    Digital Image Forensics vs. Image Composition: An Indirect Arms Race
    arxiv, 2016
    BibTeX
    @article{Schetinger2016a,
     author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.},
     title = {Digital Image Forensics vs. Image Composition: An Indirect Arms Race},
     journal = {arxiv},
     year = {2016}}
    
  241. R. Sekhar & R.S. Shaji
    A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
    Suresh, P. L. & Panigrahi, K. B. (ed.)
    Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2
    Chapter A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor
    Springer India, 2016, pp. 223-233
    DOI: 10.1007/978-81-322-2674-1_23
    BibTeX
    @inbook{Sekhar2016b,
     author = {Sekhar, Resmi and Shaji, R. S.},
     title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor},
     booktitle = {Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2},
     publisher = {Springer India},
     year = {2016},
     pages = {223--233}}
    
  242. R. Serizel, V. Bisot, S. Essid & G. Richard
    Machine listening techniques as a complement to video image analysis in forensics
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 948-952
    DOI: 10.1109/ICIP.2016.7532497
    BibTeX
    @inproceedings{Serizel2016,
     author = {Serizel, R. and Bisot, V. and Essid, S. and Richard, G.},
     title = {Machine listening techniques as a complement to video image analysis in forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {948--952}}
    
  243. A. Shahroudnejad & M. Rahmati
    Copy-move forgery detection in digital images using affine-SIFT
    Proc. 2nd Int. Conf. of Signal Processing and Intelligent Systems (ICSPIS)
    2016, pp. 1-5
    DOI: 10.1109/ICSPIS.2016.7869896
    BibTeX
    @inproceedings{Shahroudnejad2016,
     author = {Shahroudnejad, A. and Rahmati, M.},
     title = {Copy-move forgery detection in digital images using affine-SIFT},
     booktitle = {Proc. 2nd Int. Conf. of Signal Processing and Intelligent Systems (ICSPIS)},
     year = {2016},
     pages = {1--5}}
    
  244. S. Sharma & S.V. Dhavale
    A review of passive forensic techniques for detection of copy-move attacks on digital videos
    Proc. 3rd Int. Conf. Advanced Computing and Communication Systems (ICACCS)
    2016, Vol. 01, pp. 1-6
    DOI: 10.1109/ICACCS.2016.7586396
    BibTeX
    @inproceedings{Sharma2016,
     author = {Sharma, S. and Dhavale, S. V.},
     title = {A review of passive forensic techniques for detection of copy-move attacks on digital videos},
     booktitle = {Proc. 3rd Int. Conf. Advanced Computing and Communication Systems (ICACCS)},
     year = {2016},
     volume = {01},
     pages = {1--6}}
    
  245. S. Sharma, A.V. Subramanyam, M. Jain, A. Mehrish & S. Emmanuel
    Anti-forensic technique for median filtering using L1-L2 TV model
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823571
    BibTeX
    @inproceedings{Sharma2016a,
     author = {Sharma, S. and Subramanyam, A. V. and Jain, M. and Mehrish, A. and Emmanuel, S.},
     title = {Anti-forensic technique for median filtering using L1-L2 TV model},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  246. P.M. Shelke & R.S. Prasad
    Improved JPEG Anti-forensics Using Non Local Means De-noising
    Advances in Innovative Engineering and Technologies, 2016
    BibTeX
    @article{Shelke2016,
     author = {Shelke, P. M. and Prasad, Rajesh S.},
     title = {Improved JPEG Anti-forensics Using Non Local Means De-noising},
     journal = {Advances in Innovative Engineering and Technologies},
     year = {2016}}
    
  247. G. Sheng & T. Gao
    Detection of Seam-carving Image Based on Benford}s Law for Forensic Applications
    International Journal of Digital Crime and Forensics (IJDCF), 2016, Vol. 8(1)
    DOI: 10.4018/IJDCF.2016010104
    BibTeX
    @article{Sheng2016a,
     author = {Sheng, Guorui and Gao, Tiegang},
     title = {Detection of Seam-carving Image Based on Benford}s Law for Forensic Applications},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016},
     volume = {8},
     number = {1}}
    
  248. G. Sheng, T. Li, Q. Su, B. Chen & Y. Tang
    Detection of Content-aware Image Resizing Based on Benford}s Law
    Soft Computing, 2016, pp. 1-9
    DOI: 10.1007/s00500-016-2146-6
    BibTeX
    @article{Sheng2016,
     author = {Sheng, Guorui and Li, Tao and Su, Qingtang and Chen, Beijing and Tang, Yi},
     title = {Detection of Content-aware Image Resizing Based on Benford}s Law},
     journal = {Soft Computing},
     year = {2016},
     pages = {1--9}}
    
  249. Y.D. Shin
    Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm
    IJSIA, Science and Engineering Research Support Society, 2016, Vol. 10(5), pp. 203-214
    DOI: 10.14257/ijsia.2016.10.5.19
    BibTeX
    @article{Shin2016a,
     author = {Shin, Y. D.},
     title = {Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm},
     journal = {IJSIA},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {10},
     number = {5},
     pages = {203--214}}
    
  250. Y.-D. Shin
    Fast Exploration of Copy-move Forgery Image
    Advanced Science and Technology Letters, 2016
    DOI: 10.9717/kmms.2013.16.4.411
    BibTeX
    @article{Shin2016,
     author = {Shin, Yong-Dal},
     title = {Fast Exploration of Copy-move Forgery Image},
     journal = {Advanced Science and Technology Letters},
     year = {2016}}
    
  251. G. Singh & K. Singh
    Forensics for partially double compressed doctored JPEG images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4290-5
    BibTeX
    @article{Singh2016b,
     author = {Singh, Gurinder and Singh, Kulbir},
     title = {Forensics for partially double compressed doctored JPEG images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  252. N. Singh & A. Gupta
    Analysis of contrast enhancement forensics in compressed and uncompressed images
    Proc. Int. Conf. Signal Processing and Communication (ICSC)
    2016, pp. 303-307
    DOI: 10.1109/ICSPCom.2016.7980596
    BibTeX
    @inproceedings{Singh2016c,
     author = {Singh, N. and Gupta, A.},
     title = {Analysis of contrast enhancement forensics in compressed and uncompressed images},
     booktitle = {Proc. Int. Conf. Signal Processing and Communication (ICSC)},
     year = {2016},
     pages = {303--307}}
    
  253. N. Singh & S. Joshi
    Digital Image Forensics and Counter Anti-forensics
    Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, Springer, 2016
    DOI: 10.1007/978-81-322-2638-3_90
    BibTeX
    @article{Singh2016,
     author = {Singh, Neha and Joshi, Sandeep},
     title = {Digital Image Forensics and Counter Anti-forensics},
     journal = {Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing},
     publisher = {Springer},
     year = {2016}}
    
  254. N. Singh & S. Joshi
    Digital Image Forensics and Counter Anti-forensics
    Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing
    Springer, 2016
    DOI: 10.1007/978-81-322-2638-3_90
    BibTeX
    @incollection{Singh2016a,
     author = {Singh, Neha and Joshi, Sandeep},
     title = {Digital Image Forensics and Counter Anti-forensics},
     booktitle = {Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing},
     publisher = {Springer},
     year = {2016}}
    
  255. G. Soman & J.K. John
    Block-based Forgery Detection Using Global and Local Features
    Proceedings of the International Conference on Soft Computing Systems, Springer, 2016
    DOI: 10.1007/978-81-322-2671-0_14
    BibTeX
    @article{Soman2016,
     author = {Soman, Gayathri and John, Jyothish K.},
     title = {Block-based Forgery Detection Using Global and Local Features},
     journal = {Proceedings of the International Conference on Soft Computing Systems},
     publisher = {Springer},
     year = {2016}}
    
  256. A.R. Soobhany, A. Sheikh-Akbari & Z.C. Schreuders
    Source Camera Identification Using Non-decimated Wavelet Transform
    Global Security, Safety and Sustainability - The Security Challenges of the Connected World, Springer, 2016
    DOI: 10.1007/978-3-319-51064-4_11
    BibTeX
    @article{Soobhany2016,
     author = {Soobhany, Ahmad Ryad and Sheikh-Akbari, Akbar and Schreuders, Z. Cliffe},
     title = {Source Camera Identification Using Non-decimated Wavelet Transform},
     journal = {Global Security, Safety and Sustainability - The Security Challenges of the Connected World},
     publisher = {Springer},
     year = {2016}}
    
  257. J. Sreelakshmy I & J. Anver
    An improved method for copy-move forgery detection in digital forensic
    Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
    2016, pp. 1-4
    DOI: 10.1109/GET.2016.7916684
    BibTeX
    @inproceedings{SreelakshmyI2016,
     author = {Sreelakshmy I, J. and Anver, J.},
     title = {An improved method for copy-move forgery detection in digital forensic},
     booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)},
     year = {2016},
     pages = {1--4}}
    
  258. C. Srinivasa Rao & S.B.G. Tilak Babu
    Image Authentication Using Local Binary Pattern on the Low Frequency Components
    Microelectronics, Electromagnetics and Telecommunications, Springer, 2016
    DOI: 10.1007/978-81-322-2728-1_49
    BibTeX
    @article{SrinivasaRao2016,
     author = {Srinivasa Rao, Ch. and Tilak Babu, S. B. G.},
     title = {Image Authentication Using Local Binary Pattern on the Low Frequency Components},
     journal = {Microelectronics, Electromagnetics and Telecommunications},
     publisher = {Springer},
     year = {2016}}
    
  259. C. Srinivasa Rao & S.B.G. Tilak Babu
    Image Authentication Using Local Binary Pattern on the Low Frequency Components
    Microelectronics, Electromagnetics and Telecommunications
    Springer, 2016
    DOI: 10.1007/978-81-322-2728-1_49
    BibTeX
    @incollection{SrinivasaRao2016a,
     author = {Srinivasa Rao, Ch. and Tilak Babu, S. B. G.},
     title = {Image Authentication Using Local Binary Pattern on the Low Frequency Components},
     booktitle = {Microelectronics, Electromagnetics and Telecommunications},
     publisher = {Springer},
     year = {2016}}
    
  260. X. Su, B. Zhang, L. Yang, Z. Li & Y. Yang
    Scale Invariant Kernelized Correlation Filter Based on Gaussian Output
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_50
    BibTeX
    @article{Su2016,
     author = {Su, Xiangbo and Zhang, Baochang and Yang, Linlin and Li, Zhigang and Yang, Yun},
     title = {Scale Invariant Kernelized Correlation Filter Based on Gaussian Output},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  261. K. Sudhakar, V.M. Sandeep & S. Kulkarni
    Redundant sift features via level sets for fast copy move forgery detection
    Proc. Int. Conf. Signal and Information Processing (IConSIP)
    2016, pp. 1-4
    DOI: 10.1109/ICONSIP.2016.7857475
    BibTeX
    @inproceedings{Sudhakar2016,
     author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.},
     title = {Redundant sift features via level sets for fast copy move forgery detection},
     booktitle = {Proc. Int. Conf. Signal and Information Processing (IConSIP)},
     year = {2016},
     pages = {1--4}}
    
  262. A. Taimori, F. Razzazi, A. Behrad, A. Ahmadi & M. Babaie-Zadeh
    A Novel Forensic Image Analysis Tool for Discovering Double JPEG Compression Clues
    Multimedia Tools and Applications, 2016, pp. 1-35
    DOI: 10.1007/s11042-016-3409-z
    BibTeX
    @article{Taimori2016,
     author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud},
     title = {A Novel Forensic Image Analysis Tool for Discovering Double JPEG Compression Clues},
     journal = {Multimedia Tools and Applications},
     year = {2016},
     pages = {1--35}}
    
  263. Y. Tan, B. Wang, M. Li, Y. Guo, X. Kong & Y. Shi
    Digital-forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
    Shi, Y.-Q., Kim, J. H., Pérez-González, F. & Echizen, I. (ed.)
    Volume 9569 of the series Lecture Notes in Computer Science
    Chapter Camera Source Identification with Limited Labeled Training Set
    Springer International Publishing, 2016, pp. 18-27
    DOI: 10.1007/978-3-319-31960-5_2
    BibTeX
    @inbook{Tan2016,
     author = {Tan, Yue and Wang, Bo and Li, Ming and Guo, Yanqing and Kong, Xiangwei and Shi, Yunqing},
     title = {Digital-forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
     booktitle = {Volume 9569 of the series Lecture Notes in Computer Science},
     publisher = {Springer International Publishing},
     year = {2016},
     pages = {18--27}}
    
  264. S. Taspinar, M. Mohanty & N. Memon
    PRNU Based Source Attribution with a Collection of Seam-carved Images
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 156-160
    DOI: 10.1109/ICIP.2016.7532338
    BibTeX
    @inproceedings{Taspinar2016,
     author = {Taspinar, S. and Mohanty, M. and Memon, N.},
     title = {PRNU Based Source Attribution with a Collection of Seam-carved Images},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {156--160}}
    
  265. S. Teerakanok & T. Uehara
    Enhancing Image Forgery Detection Using 2-d Cross Products
    Advances in Digital Forensics XII
    Springer, 2016
    DOI: 10.1007/978-3-319-46279-0_15
    BibTeX
    @incollection{Teerakanok2016,
     author = {Teerakanok, Songpon and Uehara, Tetsutaro},
     title = {Enhancing Image Forgery Detection Using 2-d Cross Products},
     booktitle = {Advances in Digital Forensics XII},
     publisher = {Springer},
     year = {2016}}
    
  266. T.H. Thai, F. Retraint & R. Cogranne
    Camera model identification based on the generalized noise model in natural images
    Digital Signal Processing, Elsevier BV, 2016, Vol. 48, pp. 285-297
    DOI: 10.1016/j.dsp.2015.10.002
    BibTeX
    @article{Thai2016,
     author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi},
     title = {Camera model identification based on the generalized noise model in natural images},
     journal = {Digital Signal Processing},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {48},
     pages = {285--297}}
    
  267. M.K. Thakur, V. Saxena & J.P. Gupta
    Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
    Satapathy, C. S., Mandal, K. J., Udgata, K. S. & Bhateja, V. (ed.)
    Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3
    Chapter Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
    Springer India, 2016, pp. 451-459
    DOI: 10.1007/978-81-322-2757-1_45
    BibTeX
    @inbook{Thakur2016,
     author = {Thakur, Manish K. and Saxena, Vikas and Gupta, J. P.},
     title = {Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video},
     booktitle = {Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3},
     publisher = {Springer India},
     year = {2016},
     pages = {451--459}}
    
  268. V. Thirunavukkarasu & J.S. Kumar
    A Novel Method to Detect Copy-move Tampering in Digital Images
    Indian Journal of Science and Technology, 2016, Vol. 9(8)
    DOI: 10.17485/ijst/2016/v9i8/87900
    BibTeX
    @article{Thirunavukkarasu2016,
     author = {Thirunavukkarasu, V. and Kumar, J. Satheesh},
     title = {A Novel Method to Detect Copy-move Tampering in Digital Images},
     journal = {Indian Journal of Science and Technology},
     year = {2016},
     volume = {9},
     number = {8}}
    
  269. V. Thirunavukkarasu & J.S. Kumar
    Passive image tamper detection based on Fast Retina Key Point Descriptor
    Proc. IEEE Int. Conf. Advances in Computer Applications (ICACA)
    2016, pp. 279-285
    DOI: 10.1109/ICACA.2016.7887966
    BibTeX
    @inproceedings{Thirunavukkarasu2016a,
     author = {Thirunavukkarasu, V. and Kumar, J. S.},
     title = {Passive image tamper detection based on Fast Retina Key Point Descriptor},
     booktitle = {Proc. IEEE Int. Conf. Advances in Computer Applications (ICACA)},
     year = {2016},
     pages = {279--285}}
    
  270. L.-T. Thuong, H.-K. Tu & B.-D. Sinh
    Blind Image Forgeries Detection Using Detail Components from the Wavelet Transform
    Frontiers in Artificial Intelligence and Applications, IOS Press, 2016, Vol. 282(Advances in Digital Technologies), pp. 91-104
    DOI: 10.3233/978-1-61499-637-8-91
    BibTeX
    @article{Le-Tien2016,
     author = {Thuong, Le-Tien and Tu, Huynh-Kha and Sinh, Bui-Duc},
     title = {Blind Image Forgeries Detection Using Detail Components from the Wavelet Transform},
     journal = {Frontiers in Artificial Intelligence and Applications},
     publisher = {IOS Press},
     year = {2016},
     volume = {282},
     number = {Advances in Digital Technologies},
     pages = {91--104}}
    
  271. M.J. Tsai, C.L. Hsu, J.S. Yin & I. Yuadi
    Digital forensics for printed character source identification
    Proc. IEEE Int. Conf. Multimedia and Expo (ICME)
    2016, pp. 1-6
    DOI: 10.1109/ICME.2016.7552892
    BibTeX
    @inproceedings{Tsai2016,
     author = {Tsai, M. J. and Hsu, C. L. and Yin, J. S. and Yuadi, I.},
     title = {Digital forensics for printed character source identification},
     booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo (ICME)},
     year = {2016},
     pages = {1--6}}
    
  272. A. Tuama
    Camera Model Identification Based Machine Learning Approach with High Order Statistics Features
    Poc. of the 24th European Signal Processing Conference (EUSIPCO 2016), 2016
    BibTeX
    @article{Tuama2016a,
     author = {Tuama, A.},
     title = {Camera Model Identification Based Machine Learning Approach with High Order Statistics Features},
     journal = {Poc. of the 24th European Signal Processing Conference (EUSIPCO 2016)},
     year = {2016}}
    
  273. A. Tuama, F. Comby & M. Chaumont
    Source Camera Model Identification Using Features from Contaminated Sensor Noise
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_8
    BibTeX
    @article{Tuama2016,
     author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc},
     title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  274. A. Tuama, F. Comby & M. Chaumont.
    Camera Model Identification with the Use of Deep Convolutional Neural Networks
    IEEE International Workshop on Information Forensics and Security, Dec 201, 2016
    BibTeX
    @article{Tuama2016b,
     author = {Tuama, Amel and Comby, Frederic and Chaumont., Marc},
     title = {Camera Model Identification with the Use of Deep Convolutional Neural Networks},
     journal = {IEEE International Workshop on Information Forensics and Security, Dec 201},
     year = {2016}}
    
  275. I. Tuba, E. Tuba & M. Beko
    Digital image forgery detection based on shadow texture features
    Proc. 24th Telecommunications Forum (TELFOR)
    2016, pp. 1-4
    DOI: 10.1109/TELFOR.2016.7818875
    BibTeX
    @inproceedings{Tuba2016,
     author = {Tuba, I. and Tuba, E. and Beko, M.},
     title = {Digital image forgery detection based on shadow texture features},
     booktitle = {Proc. 24th Telecommunications Forum (TELFOR)},
     year = {2016},
     pages = {1--4}}
    
  276. M.B.E. Tuba & R. Jovanovic
    Overlapping Block Based Algorithm for Copy-move Forgery Detection in Digital Images
    International Journal of Computers, 2016
    BibTeX
    @article{Brajic2016,
     author = {Tuba, Momcilo Brajicand Eva and Jovanovic, Raka},
     title = {Overlapping Block Based Algorithm for Copy-move Forgery Detection in Digital Images},
     journal = {International Journal of Computers},
     year = {2016}}
    
  277. D.M. Uliyan, H.A. Jalab, A.W.A. Wahab & S. Sadeghi
    Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-points
    Symmetry, 2016
    DOI: 10.3390/sym8070062
    BibTeX
    @article{Uliyan2016a,
     author = {Uliyan, Diaa M. and Jalab, Hamid A. and Wahab, Ainuddin W. Abdul and Sadeghi, Somayeh},
     title = {Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-points},
     journal = {Symmetry},
     year = {2016}}
    
  278. D.M. Uliyan, H.A. Jalab, A.W.A. Wahab, P. Shivakumara & S. Sadeghi
    A Novel Forged Blurred Region Detection System for Image Forensic Applications
    Expert Systems with Applications, Elsevier BV, 2016, Vol. 64, pp. 1-10
    DOI: 10.1016/j.eswa.2016.07.026
    BibTeX
    @article{Uliyan2016,
     author = {Uliyan, Diaa M. and Jalab, Hamid A. and Wahab, Ainuddin W. Abdul and Shivakumara, Palaiahnakote and Sadeghi, Somayeh},
     title = {A Novel Forged Blurred Region Detection System for Image Forensic Applications},
     journal = {Expert Systems with Applications},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {64},
     pages = {1--10}}
    
  279. B. Ustubioglu, G. Ulutas, M. Ulutas, V. Nabiyev & A. Ustubioglu
    LBP-DCT Based Copy Move Forgery Detection Algorithm
    Lecture Notes in Electrical Engineering
    Springer, 2016, pp. 127-136
    DOI: 10.1007/978-3-319-22635-4_11
    BibTeX
    @incollection{Ustubioglu2016,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Ulutas, Mustafa and Nabiyev, Vasif and Ustubioglu, Arda},
     title = {LBP-DCT Based Copy Move Forgery Detection Algorithm},
     booktitle = {Lecture Notes in Electrical Engineering},
     publisher = {Springer},
     year = {2016},
     pages = {127--136}}
    
  280. B. Ustubioglu, G. Ulutas, M. Ulutas & V.V. Nabiyev
    Improved Copy-move Forgery Detection Based on the Clds and Colour Moments
    The Imaging Science Journal, 2016, Vol. 64(4), pp. 215-225
    DOI: 10.1080/13682199.2016.1162922
    BibTeX
    @article{Ustubioglu2016a,
     author = {Ustubioglu, B. and Ulutas, G. and Ulutas, M. and Nabiyev, V. V.},
     title = {Improved Copy-move Forgery Detection Based on the Clds and Colour Moments},
     journal = {The Imaging Science Journal},
     year = {2016},
     volume = {64},
     number = {4},
     pages = {215--225}}
    
  281. B. Ustubioglu, G. Ulutas, M. Ulutas & V.V. Nabiyev
    A New Copy Move Forgery Detection Technique with Automatic Threshold Determination
    AEU\ - International Journal of Electronics and Communications, 2016, pp. -
    DOI: 10.1016/j.aeue.2016.05.005
    BibTeX
    @article{Ustubioglu2016b,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Ulutas, Mustafa and Nabiyev, Vasif V.},
     title = {A New Copy Move Forgery Detection Technique with Automatic Threshold Determination},
     journal = {AEU\ - International Journal of Electronics and Communications},
     year = {2016},
     pages = {-}}
    
  282. D. Vaishnavi & T.S. Subashini
    Recognizing Image Splicing Forgeries Using Histogram Features
    2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC)
    2016, pp. 1-4
    DOI: 10.1109/ICBDSC.2016.7460342
    BibTeX
    @inproceedings{Vaishnavi2016,
     author = {Vaishnavi, D. and Subashini, T. S.},
     title = {Recognizing Image Splicing Forgeries Using Histogram Features},
     booktitle = {2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC)},
     year = {2016},
     pages = {1--4}}
    
  283. L.J.G. Villalba, A.L.S. Orozco, J.R. Corripio & J. Hernandez-Castro
    A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques
    Future Generation Computer Systems, Elsevier, 2016
    DOI: 10.1016/j.future.2016.11.007
    BibTeX
    @article{Villalba2016a,
     author = {Villalba, Luis Javier Garc\ia and Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and Hernandez-Castro, Julio},
     title = {A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier},
     year = {2016}}
    
  284. L.J.G. Villalba, A.L.S. Orozco, R.R. López & J.H. Castro
    Identification of Smartphone Brand and Model Via Forensic Video Analysis
    Expert Systems with Applications, 2016, Vol. 55, pp. 59-69
    DOI: 10.1016/j.eswa.2016.01.025
    BibTeX
    @article{Villalba2016,
     author = {Villalba, Luis Javier García and Orozco, Ana Lucila Sandoval and López, Raquel Ramos and Castro, Julio Hernandez},
     title = {Identification of Smartphone Brand and Model Via Forensic Video Analysis},
     journal = {Expert Systems with Applications},
     year = {2016},
     volume = {55},
     pages = {59--69}}
    
  285. H. Wang, H. Wang & C. Shi
    An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_37
    BibTeX
    @article{Wang2016o,
     author = {Wang, Huan and Wang, Hongxia and Shi, Canghong},
     title = {An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  286. H. Wang, H.-X. Wang, X.-M. Sun & Q. Qian
    A Passive Authentication Scheme for Copy-move Forgery Based on Package Clustering Algorithm
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3687-5
    BibTeX
    @article{Wang2016a,
     author = {Wang, Huan and Wang, Hong-Xia and Sun, Xing-Ming and Qian, Qing},
     title = {A Passive Authentication Scheme for Copy-move Forgery Based on Package Clustering Algorithm},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  287. J. Wang, T. Li, Y.-Q. Shi, S. Lian & J. Ye
    Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4153-0
    BibTeX
    @article{Wang2016d,
     author = {Wang, Jinwei and Li, Ting and Shi, Yun-Qing and Lian, Shiguo and Ye, Jingyu},
     title = {Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  288. Q. Wang & R. Zhang
    Double JPEG Compression Forensics Based on a Convolutional Neural Network
    EURASIP Journal on Information Security, Springer, 2016, Vol. 2016(1), pp. 1
    DOI: 10.1186/s13635-016-0047-y
    BibTeX
    @article{Wang2016b,
     author = {Wang, Qing and Zhang, Rong},
     title = {Double JPEG Compression Forensics Based on a Convolutional Neural Network},
     journal = {EURASIP Journal on Information Security},
     publisher = {Springer},
     year = {2016},
     volume = {2016},
     number = {1},
     pages = {1}}
    
  289. Q. Wang & R. Zhang
    Double JPEG compression forensics based on a convolutional neural network
    EURASIP Journal on Information Security, Springer, 2016, Vol. 2016(1), pp. 1
    DOI: 10.1186/s13635-016-0047-y
    BibTeX
    @article{Wang2016e,
     author = {Wang, Qing and Zhang, Rong},
     title = {Double JPEG compression forensics based on a convolutional neural network},
     journal = {EURASIP Journal on Information Security},
     publisher = {Springer},
     year = {2016},
     volume = {2016},
     number = {1},
     pages = {1}}
    
  290. X.-Y. Wang, S. Li, Y.-N. Liu, Y. Niu, H.-Y. Yang & Z.-l. Zhou
    A new keypoint-based copy-move forgery detection for small smooth regions
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4140-5
    BibTeX
    @article{Wang2016c,
     author = {Wang, Xiang-Yang and Li, Shuo and Liu, Yu-Nan and Niu, Ying and Yang, Hong-Ying and Zhou, Zhi-li},
     title = {A new keypoint-based copy-move forgery detection for small smooth regions},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  291. X.-y. Wang, Y.-n. Liu, H. Xu, P. Wang & H.-y. Yang
    Robust Copy-move Forgery Detection Using Quaternion Exponent Moments
    Pattern Analysis and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s10044-016-0588-1
    BibTeX
    @article{Wang2016,
     author = {Wang, Xiang-yang and Liu, Yu-nan and Xu, Huan and Wang, Pei and Yang, Hong-ying},
     title = {Robust Copy-move Forgery Detection Using Quaternion Exponent Moments},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  292. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    A Scaling Robust Copy-paste Tampering Detection for Digital Image Forensics
    Procedia Computer Science, 2016, Vol. 79, pp. 458-465
    DOI: 10.1016/j.procs.2016.03.059
    BibTeX
    @article{Warbhe2016,
     author = {Warbhe, Anil Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {A Scaling Robust Copy-paste Tampering Detection for Digital Image Forensics},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {79},
     pages = {458--465}}
    
  293. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    Computationally Efficient Digital Image Forensic Method for Image Authentication
    Procedia Computer Science, 2016, Vol. 78, pp. 464-470
    DOI: 10.1016/j.procs.2016.02.089
    BibTeX
    @article{Warbhe2016a,
     author = {Warbhe, Anil Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {Computationally Efficient Digital Image Forensic Method for Image Authentication},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {78},
     pages = {464--470}}
    
  294. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    Digital Image Forensics: An Affine Transform Robust Copy-paste Tampering Detection
    Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)
    2016, pp. 1-5
    DOI: 10.1109/ISCO.2016.7727045
    BibTeX
    @inproceedings{Warbhe2016b,
     author = {Warbhe, A. Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {Digital Image Forensics: An Affine Transform Robust Copy-paste Tampering Detection},
     booktitle = {Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)},
     year = {2016},
     pages = {1--5}}
    
  295. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    Digital image forensics: An affine transform robust copy-paste tampering detection
    Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)
    2016, pp. 1-5
    DOI: 10.1109/ISCO.2016.7727045
    BibTeX
    @inproceedings{Warbhe2016c,
     author = {Warbhe, A. Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {Digital image forensics: An affine transform robust copy-paste tampering detection},
     booktitle = {Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)},
     year = {2016},
     pages = {1--5}}
    
  296. N.B.A. Warif, A.W.A. Wahab, M.Y.I. Idris, R. Ramli, R. Salleh, S. Shamshirband & K.-K.R. Choo
    Copy-move Forgery Detection: Survey, Challenges and Future Directions
    Journal of Network and Computer Applications, Elsevier BV, 2016, Vol. 75, pp. 259-278
    DOI: 10.1016/j.jnca.2016.09.008
    BibTeX
    @article{Ashraf2016,
     author = {Warif, Nor Bakiah Abd and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna and Ramli, Roziana and Salleh, Rosli and Shamshirband, Shahaboddin and Choo, Kim-Kwang Raymond},
     title = {Copy-move Forgery Detection: Survey, Challenges and Future Directions},
     journal = {Journal of Network and Computer Applications},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {75},
     pages = {259--278}}
    
  297. B. Wen, Y. Zhu, R. Subramanian, T.T. Ng, X. Shen & S. Winkler
    COVERAGE --- A novel database for copy-move forgery detection
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 161-165
    DOI: 10.1109/ICIP.2016.7532339
    BibTeX
    @inproceedings{Wen2016a,
     author = {Wen, B. and Zhu, Y. and Subramanian, R. and Ng, T. T. and Shen, X. and Winkler, S.},
     title = {COVERAGE --- A novel database for copy-move forgery detection},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {161--165}}
    
  298. B. Wen, Y. Zhu, R. Subramanian, T.-T. Ng, X. Shen & S. Winkler
    COVERAGE Novel Database for Copy-move Forgery Detection
    ICASSP(submitted), 2016
    DOI: 10.1109/icip.2016.7532339
    BibTeX
    @article{Wen2016,
     author = {Wen, Bihan and Zhu, Ye and Subramanian, Ramanathan and Ng, Tian-Tsong and Shen, Xuanjing and Winkler, Stefan},
     title = {COVERAGE Novel Database for Copy-move Forgery Detection},
     journal = {ICASSP(submitted)},
     year = {2016}}
    
  299. S. Wenchang, Z. Fei, Q. Bo & L. Bin
    Improving Image Copy-move Forgery Detection with Particle Swarm Optimization Techniques
    China Communications, 2016, Vol. 13(1), pp. 139-149
    DOI: 10.1109/CC.2016.7405711
    BibTeX
    @article{Wenchang2016,
     author = {Wenchang, Shi and Fei, Zhao and Bo, Qin and Bin, Liang},
     title = {Improving Image Copy-move Forgery Detection with Particle Swarm Optimization Techniques},
     journal = {China Communications},
     year = {2016},
     volume = {13},
     number = {1},
     pages = {139--149}}
    
  300. D. Williams, G. Krishnalal & V.P. Jagathy Raj
    Fraudulent Image Recognition Using Stable Inherent Feature
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_2
    BibTeX
    @article{Williams2016,
     author = {Williams, Deny and Krishnalal, G. and Jagathy Raj, V. P.},
     title = {Fraudulent Image Recognition Using Stable Inherent Feature},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  301. D. Williams, G. Krishnalal & V.P. Jagathy Raj
    Fraudulent Image Recognition Using Stable Inherent Feature
    Advances in Signal Processing and Intelligent Recognition Systems
    Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_2
    BibTeX
    @incollection{Williams2016a,
     author = {Williams, Deny and Krishnalal, G. and Jagathy Raj, V. P.},
     title = {Fraudulent Image Recognition Using Stable Inherent Feature},
     booktitle = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  302. M. Xia, G. Yang, L. Li, R. Li & X. Sun
    Detecting Video Frame Rate Up-conversion Based on Frame-level Analysis of Average Texture Variation
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3468-1
    BibTeX
    @article{Xia2016,
     author = {Xia, Min and Yang, Gaobo and Li, Leida and Li, Ran and Sun, Xingming},
     title = {Detecting Video Frame Rate Up-conversion Based on Frame-level Analysis of Average Texture Variation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  303. L. Xicheng & X. Jianzhong
    Blind Identification Algorithm of Photorealistic Computer Grapic Based on Weber Local Features.
    Journal of Digital Information Management, 2016
    BibTeX
    @article{Xicheng2016,
     author = {Xicheng, Liu and Jianzhong, Xi},
     title = {Blind Identification Algorithm of Photorealistic Computer Grapic Based on Weber Local Features.},
     journal = {Journal of Digital Information Management},
     year = {2016}}
    
  304. Y. Xie & Y. Wang
    Blind Authentication for Detecting Multi-image Forgery
    Proc. SPIE, 2016, Vol. 10033, pp. 1003346-1003346-5
    DOI: 10.1117/12.2245319
    BibTeX
    @other{Xie2016,
     author = {Xie, Yi and Wang, Yulin},
     title = {Blind Authentication for Detecting Multi-image Forgery},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {10033},
     pages = {1003346-1003346-5}}
    
  305. B. Xu, X. Wang, X. Zhou, J. Xi & S. Wang
    Source Camera Identification from Image Texture Features
    Neurocomputing, 2016, pp. -
    DOI: 10.1016/j.neucom.2016.05.012
    BibTeX
    @article{Xu2016,
     author = {Xu, Bingchao and Wang, Xiaofeng and Zhou, Xiaorui and Xi, Jianghuan and Wang, Shangping},
     title = {Source Camera Identification from Image Texture Features},
     journal = {Neurocomputing},
     year = {2016},
     pages = {-}}
    
  306. C.P. Yan, C.M. Pun & X.C. Yuan
    Quaternion-Based Image Hashing for Adaptive Tampering Localization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(12), pp. 2664-2677
    DOI: 10.1109/TIFS.2016.2594136
    BibTeX
    @article{Yan2016,
     author = {Yan, C. P. and Pun, C. M. and Yuan, X. C.},
     title = {Quaternion-Based Image Hashing for Adaptive Tampering Localization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {12},
     pages = {2664--2677}}
    
  307. B. Yang & H. Guo
    An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_40
    BibTeX
    @article{Yang2016b,
     author = {Yang, Bin and Guo, Honglei},
     title = {An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  308. L. Yang, T. Gao, Y. Xuan & H. Gao
    Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length
    International Journal of Digital Crime and Forensics (IJDCF), 2016
    DOI: 10.4018/IJDCF.2016040103
    BibTeX
    @article{Yang2016,
     author = {Yang, Liang and Gao, Tiegang and Xuan, Yan and Gao, Hang},
     title = {Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016}}
    
  309. P. Yang, G. Yang & D. Zhang
    Rotation Invariant Local Binary Pattern for Blind Detection of Copy-move Forgery with Affine Transform
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_36
    BibTeX
    @article{Yang2016c,
     author = {Yang, Pei and Yang, Gaobo and Zhang, Dengyong},
     title = {Rotation Invariant Local Binary Pattern for Blind Detection of Copy-move Forgery with Affine Transform},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  310. H. Yao
    A Novel Image Noise Level Function Estimation Approach Using Camera Response Function Constraint
    Plapper, P., Guo, M. & Suhag, S. (ed.)
    MATEC Web of Conferences, EDP Sciences, 2016, Vol. 42, pp. 06004
    DOI: 10.1051/matecconf/20164206004
    BibTeX
    @article{Yao2016a,
     author = {Yao, Heng},
     title = {A Novel Image Noise Level Function Estimation Approach Using Camera Response Function Constraint},
     journal = {MATEC Web of Conferences},
     publisher = {EDP Sciences},
     year = {2016},
     volume = {42},
     pages = {06004}}
    
  311. H. Yao, S. Wang, X. Zhang, C. Qin & J. Wang
    Detecting Image Splicing Based on Noise Level Inconsistency
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3660-3
    BibTeX
    @article{Yao2016,
     author = {Yao, Heng and Wang, Shuozhong and Zhang, Xinpeng and Qin, Chuan and Wang, Jinwei},
     title = {Detecting Image Splicing Based on Noise Level Inconsistency},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  312. Y. Yao, Y. Cheng & X. Li
    Video Objects Removal Forgery Detection and Localization
    Proc. Nicograph Int. (NicoInt)
    2016, pp. 137
    DOI: 10.1109/NicoInt.2016.30
    BibTeX
    @inproceedings{Yao2016b,
     author = {Yao, Y. and Cheng, Y. and Li, X.},
     title = {Video Objects Removal Forgery Detection and Localization},
     booktitle = {Proc. Nicograph Int. (NicoInt)},
     year = {2016},
     pages = {137}}
    
  313. A. Yaşar, F. Deniz & M. Doru
    Suspect Camera Determination
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 1837-1840
    DOI: 10.1109/SIU.2016.7496120
    BibTeX
    @inproceedings{Yasar2016,
     author = {Yaşar, A. and Deniz, F. and Doru, M.},
     title = {Suspect Camera Determination},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {1837--1840}}
    
  314. F. Yavuz, A. Bal & H. Cukur
    An Effective Detection Algorithm for Region Duplication Forgery in Digital Images
    Casasent, D. & Alam, M. S. (ed.)
    Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O (April 20, 2016)
    Proc. SPIE, 2016, Vol. 9845, pp. 98450O-98450O-7
    DOI: 10.1117/12.2223732
    BibTeX
    @inproceedings{Yavuz2016,
     author = {Yavuz, Fatih and Bal, Abdullah and Cukur, Huseyin},
     title = {An Effective Detection Algorithm for Region Duplication Forgery in Digital Images},
     booktitle = {Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O (April 20, 2016)},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {9845},
     pages = {98450O-98450O-7}}
    
  315. R.P. Yohannan & M. Manuel
    Detection of copy-move forgery based on Gabor filter
    Proc. IEEE Int. Conf. Engineering and Technology (ICETECH)
    2016, pp. 629-634
    DOI: 10.1109/ICETECH.2016.7569326
    BibTeX
    @inproceedings{Yohannan2016,
     author = {Yohannan, R. P. and Manuel, M.},
     title = {Detection of copy-move forgery based on Gabor filter},
     booktitle = {Proc. IEEE Int. Conf. Engineering and Technology (ICETECH)},
     year = {2016},
     pages = {629--634}}
    
  316. B.A.B. Youssef & E.H. Atta
    Image Forgery Detection using FREAK Binary Descriptor and Level Set Segmentation
    International Journal of Scientific & Engineering Research, Volu, 2016, Vol. 7(2)
    BibTeX
    @article{Youssef2016,
     author = {Youssef, Bayumy A. B. and Atta, Essam H.},
     title = {Image Forgery Detection using FREAK Binary Descriptor and Level Set Segmentation},
     journal = {International Journal of Scientific & Engineering Research, Volu},
     year = {2016},
     volume = {7},
     number = {2}}
    
  317. L. Yu, Q. Han & X. Niu
    Feature Point-based Copy-move Forgery Detection: Covering the Non-textured Areas
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(2), pp. 1159
    DOI: 10.1007/s11042-014-2362-y
    BibTeX
    @article{Yu2016,
     author = {Yu, Liyang and Han, Qi and Niu, Xiamu},
     title = {Feature Point-based Copy-move Forgery Detection: Covering the Non-textured Areas},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {2},
     pages = {1159}}
    
  318. Y. Yuan, Y. Zhang, S. Chen & H. Wang
    Robust Region Duplication Detection on Log-polar Domain Using Band Limitation
    Arabian Journal for Science and Engineering, Springer, 2016, pp. 1
    DOI: 10.1007/s13369-016-2268-2
    BibTeX
    @article{Yuan2016,
     author = {Yuan, Yue and Zhang, Yun and Chen, Shuang and Wang, Hong},
     title = {Robust Region Duplication Detection on Log-polar Domain Using Band Limitation},
     journal = {Arabian Journal for Science and Engineering},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  319. M. Zampoglou, S. Papadopoulos & Y. Kompatsiaris
    Large-scale Evaluation of Splicing Localization Algorithms for Web Images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3795-2
    BibTeX
    @article{Zampoglou2016a,
     author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis},
     title = {Large-scale Evaluation of Splicing Localization Algorithms for Web Images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  320. M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris, R. Bouwmeester & J. Spangenberg
    Web and Social Media Image Forensics for News Professionals
    2016
    BibTeX
    @electronic{Zampoglou2016,
     author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis and Bouwmeester, Ruben and Spangenberg, Jochen},
     title = {Web and Social Media Image Forensics for News Professionals},
     year = {2016}}
    
  321. M. Zandi, A. Mahmoudi-Aznaveh & A. Talebpour
    Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(11), pp. 2499-2512
    DOI: 10.1109/TIFS.2016.2585118
    BibTeX
    @article{Zandi2016,
     author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Talebpour, A.},
     title = {Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {11},
     pages = {2499--2512}}
    
  322. H. Zeng, X. Kang & A. Peng
    A Multi-purpose Countermeasure against Image Anti-forensics Using Autoregressive Model
    Neurocomputing, Elsevier BV, 2016, Vol. 189, pp. 117-122
    DOI: 10.1016/j.neucom.2015.12.089
    BibTeX
    @article{Zeng2016,
     author = {Zeng, Hui and Kang, Xiangui and Peng, Anjie},
     title = {A Multi-purpose Countermeasure against Image Anti-forensics Using Autoregressive Model},
     journal = {Neurocomputing},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {189},
     pages = {117--122}}
    
  323. H. Zeng, J. Liu, J. Yu, X. Kang, Y.Q. Shi & Z.J. Wang
    A Framework of Camera Source Identification Bayesian Game
    IEEE Transactions on Cybernetics, 2016, Vol. PP(99), pp. 1-12
    DOI: 10.1109/TCYB.2016.2557802
    BibTeX
    @article{Zeng2016a,
     author = {Zeng, H. and Liu, J. and Yu, J. and Kang, X. and Shi, Y. Q. and Wang, Z. J.},
     title = {A Framework of Camera Source Identification Bayesian Game},
     journal = {IEEE Transactions on Cybernetics},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--12}}
    
  324. H. Zeng, Y. Zhan, X. Kang & X. Lin
    Image Splicing Localization Using PCA-based Noise Level Estimation
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3712-8
    BibTeX
    @article{Zeng2016c,
     author = {Zeng, Hui and Zhan, Yifeng and Kang, Xiangui and Lin, Xiaodan},
     title = {Image Splicing Localization Using PCA-based Noise Level Estimation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  325. J. Zeng, W. Lu, R. Yang & X. Qiu
    Practical Tools for Digital Image Forensic Authentication
    Advanced Multimedia and Ubiquitous Engineering
    Springer, 2016
    DOI: 10.1007/978-981-10-1536-6_59
    BibTeX
    @incollection{Zeng2016d,
     author = {Zeng, Jinhua and Lu, Wei and Yang, Rui and Qiu, Xiulian},
     title = {Practical Tools for Digital Image Forensic Authentication},
     booktitle = {Advanced Multimedia and Ubiquitous Engineering},
     publisher = {Springer},
     year = {2016}}
    
  326. J. Zeng, S. Shi, Y. Li & Q. Lu
    Practical Inspection Workflow for Digital Image Forensic Authentication
    Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)
    2016, pp. 172
    DOI: 10.1109/ISDFS.2016.7473540
    BibTeX
    @inproceedings{Zeng2016b,
     author = {Zeng, J. and Shi, S. and Li, Y. and Lu, Q.},
     title = {Practical Inspection Workflow for Digital Image Forensic Authentication},
     booktitle = {Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)},
     year = {2016},
     pages = {172}}
    
  327. L. Zhan, Y. Zhu & Z. Mo
    An Image Splicing Detection Method Based on PCA Minimum Eigenvalues
    Journal of Information Hiding and Multimedia Signal Processing, 2016
    BibTeX
    @article{Zhan2016,
     author = {Zhan, Lifei and Zhu, Yuesheng and Mo, Zhiwei},
     title = {An Image Splicing Detection Method Based on PCA Minimum Eigenvalues},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2016}}
    
  328. J. Zhang, W. Zhu, B. Li, W. Hu & J. Yang
    Image Copy Detection Based on Convolutional Neural Networks
    Pattern Recognition, Springer, 2016
    DOI: 10.1007/978-981-10-3005-5_10
    BibTeX
    @article{Zhang2016d,
     author = {Zhang, Jing and Zhu, Wenting and Li, Bing and Hu, Weiming and Yang, Jinfeng},
     title = {Image Copy Detection Based on Convolutional Neural Networks},
     journal = {Pattern Recognition},
     publisher = {Springer},
     year = {2016}}
    
  329. L.-B. Zhang, F. Peng & M. Long
    Identifing source camera using guided image estimation and block weighted average
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016
    DOI: 10.1016/j.jvcir.2016.12.013
    BibTeX
    @article{Zhang2016b,
     author = {Zhang, Le-Bing and Peng, Fei and Long, Min},
     title = {Identifing source camera using guided image estimation and block weighted average},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  330. Q. Zhang, W. Lu & J. Weng
    Joint Image Splicing Detection in DCT and Contourlet Transform Domain
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016, Vol. 40, pp. 449-458
    DOI: 10.1016/j.jvcir.2016.07.013
    BibTeX
    @article{Zhang2016a,
     author = {Zhang, Qingbo and Lu, Wei and Weng, Jian},
     title = {Joint Image Splicing Detection in DCT and Contourlet Transform Domain},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {40},
     pages = {449--458}}
    
  331. Z. Zhang, J. Hou, Z. Li & D. Li
    Inter-frame Forgery Detection for Static-background Video Based on Mvp Consistency
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_9
    BibTeX
    @article{Zhang2016,
     author = {Zhang, Zhenzhen and Hou, Jianjun and Li, Zhaohong and Li, Dongdong},
     title = {Inter-frame Forgery Detection for Static-background Video Based on Mvp Consistency},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  332. Y. Zhanga, J. Goha, L.L. Wina & V. Thinga
    Image Region Forgery Detection: A Deep Learning Approach
    Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design
    2016, Vol. 14, pp. 1
    DOI: 10.1109/icip.1994.413765
    BibTeX
    @inproceedings{Zhanga2016,
     author = {Zhanga, Ying and Goha, Jonathan and Wina, Lei Lei and Thinga, Vrizlynn},
     title = {Image Region Forgery Detection: A Deep Learning Approach},
     booktitle = {Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design},
     year = {2016},
     volume = {14},
     pages = {1}}
    
  333. Zhao
    An Overview on Passive Image Forensics Technology for Automatic Computer Forgery
    International Journal of Digital Crime and Forensics (IJDCF), 2016, Vol. 8(4)
    DOI: 10.4018/IJDCF.2016100102
    BibTeX
    @article{Zhao2016a,
     author = {Zhao},
     title = {An Overview on Passive Image Forensics Technology for Automatic Computer Forgery},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016},
     volume = {8},
     number = {4}}
    
  334. F. Zhao, W. Shi, B. Qin & B. Liang
    Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection
    Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2016
    DOI: 10.1007/978-3-319-49148-6_39
    BibTeX
    @article{Zhao2016b,
     author = {Zhao, Fei and Shi, Wenchang and Qin, Bo and Liang, Bin},
     title = {Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection},
     journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage},
     publisher = {Springer},
     year = {2016}}
    
  335. F. Zhao, W. Shi, B. Qin & B. Liang
    A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation
    Proc. Third Int. Conf. Trustworthy Systems and their Applications (TSA)
    2016, pp. 8-16
    DOI: 10.1109/TSA.2016.12
    BibTeX
    @inproceedings{Zhao2016c,
     author = {Zhao, F. and Shi, W. and Qin, B. and Liang, B.},
     title = {A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation},
     booktitle = {Proc. Third Int. Conf. Trustworthy Systems and their Applications (TSA)},
     year = {2016},
     pages = {8--16}}
    
  336. X. Zhao & M.C. Stamm
    Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model Identification
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 151-155
    DOI: 10.1109/ICIP.2016.7532337
    BibTeX
    @inproceedings{Zhao2016,
     author = {Zhao, X. and Stamm, M. C.},
     title = {Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model Identification},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {151--155}}
    
  337. J. Zheng, Y. Liu, J. Ren, T. Zhu, Y. Yan & H. Yang
    Fusion of Block and Keypoints Based Approaches for Effective Copy-move Image Forgery Detection
    Multidimensional Systems and Signal Processing, 2016, pp. 1-17
    DOI: 10.1007/s11045-016-0416-1
    BibTeX
    @article{Zheng2016,
     author = {Zheng, Jiangbin and Liu, Yanan and Ren, Jinchang and Zhu, Tingge and Yan, Yijun and Yang, Heng},
     title = {Fusion of Block and Keypoints Based Approaches for Effective Copy-move Image Forgery Detection},
     journal = {Multidimensional Systems and Signal Processing},
     year = {2016},
     pages = {1--17}}
    
  338. H. Zhou, Y. Shen, X. Zhu, B. Liu, Z. Fu & N. Fan
    Digital Image Modification Detection Using Color Information and Its Histograms
    Forensic Science International, Elsevier BV, 2016, Vol. 266, pp. 379-388
    DOI: 10.1016/j.forsciint.2016.06.005
    BibTeX
    @article{Zhou2016,
     author = {Zhou, Haoyu and Shen, Yue and Zhu, Xinghui and Liu, Bo and Fu, Zigang and Fan, Na},
     title = {Digital Image Modification Detection Using Color Information and Its Histograms},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {266},
     pages = {379--388}}
    
  339. Y. Zhou & Y. Xie
    Copy-move Forgery Detection Using Improved SIFT
    Proc. SPIE, 2016, Vol. 10033, pp. 100334S-100334S-6
    DOI: 10.1117/12.2244287
    BibTeX
    @other{Zhou2016a,
     author = {Zhou, Yigang and Xie, Yunfang},
     title = {Copy-move Forgery Detection Using Improved SIFT},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {10033},
     pages = {100334S-100334S-6}}
    
  340. N. Zhu, C. Deng & X. Gao
    A Learning-to-rank Approach for Image Scaling Factor Estimation
    Neurocomputing, 2016, pp. -
    DOI: 10.1016/j.neucom.2015.06.113
    BibTeX
    @article{Zhu2016,
     author = {Zhu, Nan and Deng, Cheng and Gao, Xinbo},
     title = {A Learning-to-rank Approach for Image Scaling Factor Estimation},
     journal = {Neurocomputing},
     year = {2016},
     pages = {-}}
    
  341. N. Zhu, C. Deng & X. Gao
    Image Sharpening Detection Based on Multiresolution Overshoot Artifact Analysis
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3938-5
    BibTeX
    @article{Zhu2016c,
     author = {Zhu, Nan and Deng, Cheng and Gao, Xinbo},
     title = {Image Sharpening Detection Based on Multiresolution Overshoot Artifact Analysis},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  342. Y. Zhu, T.-T. Ng, X. Shen & B. Wen
    Revisiting Copy-move Forgery Detection by Considering Realistic Image with Similar but Genuine Objects
    arXiv preprint arXiv:1601.07262, 2016
    DOI: 10.1007/s11042-014-2431-2
    BibTeX
    @article{Zhu2016a,
     author = {Zhu, Ye and Ng, Tian-Tsong and Shen, Xuanjing and Wen, Bihan},
     title = {Revisiting Copy-move Forgery Detection by Considering Realistic Image with Similar but Genuine Objects},
     journal = {arXiv preprint arXiv:1601.07262},
     year = {2016}}
    
  343. Y. Zhu, X. Shen & H. Chen
    Copy-move Forgery Detection Based on Scaled ORB
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(6), pp. 3221
    DOI: 10.1007/s11042-014-2431-2
    BibTeX
    @article{Zhu2016b,
     author = {Zhu, Ye and Shen, Xuanjing and Chen, Haipeng},
     title = {Copy-move Forgery Detection Based on Scaled ORB},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {6},
     pages = {3221}}
    
  344. Y. Zhu, R. Subramanian, T.T. Ng, S. Winkler & R. Ratnam
    Comparison of human and machine performance for copy-move image forgery detection involving similar but genuine objects
    Proc. IEEE Region 10 Conf. (TENCON)
    2016, pp. 1379-1383
    DOI: 10.1109/TENCON.2016.7848240
    BibTeX
    @inproceedings{Zhu2016e,
     author = {Zhu, Y. and Subramanian, R. and Ng, T. T. and Winkler, S. and Ratnam, R.},
     title = {Comparison of human and machine performance for copy-move image forgery detection involving similar but genuine objects},
     booktitle = {Proc. IEEE Region 10 Conf. (TENCON)},
     year = {2016},
     pages = {1379--1383}}
    
  345. Y. Zhu, R. Subramanian, T.-T. Ng, S. Winkler & R. Ratnam
    Comparison of Human and Machine Performance for Copy-move Image Forgery Detection Involving Similar but Genuine Objects
    Proc. IEEE Region 10 International Conference (TENCON), Singapore, Nov. 22-25, 2016
    2016
    BibTeX
    @conference{Zhu2016d,
     author = {Zhu, Y. and Subramanian, R. and Ng, T.-T. and Winkler, S. and Ratnam, R.},
     title = {Comparison of Human and Machine Performance for Copy-move Image Forgery Detection Involving Similar but Genuine Objects},
     booktitle = {Proc. IEEE Region 10 International Conference (TENCON), Singapore, Nov. 22-25, 2016},
     year = {2016}}
    
  346. V. Zorilo, Y. Lebedeva, M. Kozina & D. Belush
    Method of Photomontage Detection under Conditions of Limitations Absence for Photos Falsification
    Odes'kyi Politechnichnyi Universytet. Pratsi, Odessa National Polytechnic University, 2016(2), pp. 51-55
    DOI: 10.15276/opu.2.49.2016.12
    BibTeX
    @article{Zorilo2016,
     author = {Zorilo, Viktoriya and Lebedeva, Yelena and Kozina, Maria and Belush, Daria},
     title = {Method of Photomontage Detection under Conditions of Limitations Absence for Photos Falsification},
     journal = {Odes'kyi Politechnichnyi Universytet. Pratsi},
     publisher = {Odessa National Polytechnic University},
     year = {2016},
     number = {2},
     pages = {51--55}}
    
  347. Digital-Forensics and Watermarking
    Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Echizen, I. (ed.)
    Springer International Publishing, 2016
    BibTeX
    @book{Shi2016,,
     title = {Digital-Forensics and Watermarking},
     publisher = {Springer International Publishing},
     year = {2016}}
    


2015

  1. W. Zhao & H. Liu
    An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames
    Zha, H., Chen, X., Wang, L. & Miao, Q. (ed.)
    Computer Vision
    Springer Berlin Heidelberg, 2015, Vol. 546, pp. 325-334
    DOI: 10.1007/978-3-662-48558-3_33
    BibTeX
    @incollection{Zhao2015b,
     author = {Zhao, Wenyong and Liu, Hong},
     title = {An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames},
     booktitle = {Computer Vision},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     volume = {546},
     pages = {325--334}}
    
  2. E. Achimescu, R.O. Preda, N. Vizireanu & I. Pirnog
    Multiple Point Android Digital Image Authentication
    Proc. Int Signals, Circuits and Systems (ISSCS) Symp
    2015, pp. 1-4
    DOI: 10.1109/ISSCS.2015.7203945
    BibTeX
    @inproceedings{Achimescu2015,
     author = {Achimescu, E. and Preda, R. O. and Vizireanu, N. and Pirnog, I.},
     title = {Multiple Point Android Digital Image Authentication},
     booktitle = {Proc. Int Signals, Circuits and Systems (ISSCS) Symp},
     year = {2015},
     pages = {1--4}}
    
  3. S. Agarwal & S. Chand
    Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization
    I.J. Image, Graphics and Signal Processing, 2015
    DOI: 10.5815/ijigsp.2015.10.08
    BibTeX
    @article{Agarwal2015,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015}}
    
  4. S. Agarwal & S. Chand
    Anti-forensics of JPEG Images Using Interpolation
    I.J. Image, Graphics and Signal Processing, 2015, Vol. 12, pp. 10-17
    DOI: 10.5815/ijigsp.2015.12.02
    BibTeX
    @article{Agarwal2015a,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Anti-forensics of JPEG Images Using Interpolation},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015},
     volume = {12},
     pages = {10--17}}
    
  5. H.M. Ahmed & S.R. Salim
    A Method for Detect Forgery from Images
    Eng.& Tech.Journal, 2015, Vol. 33(2)
    DOI: 10.1109/ceec.2014.6958558
    BibTeX
    @article{Ahmed2015,
     author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan},
     title = {A Method for Detect Forgery from Images},
     journal = {Eng.& Tech.Journal},
     year = {2015},
     volume = {33},
     number = {2}}
    
  6. H.M. Ahmed & S.R. Salim
    Method for Detect and Extract Forgery from Images
    Al - Mansour Journal, 2015
    BibTeX
    @article{Ahmed2015a,
     author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan},
     title = {Method for Detect and Extract Forgery from Images},
     journal = {Al - Mansour Journal},
     year = {2015}}
    
  7. F. Alanazi & A. Jones
    The Value of Metadata in Digital Forensics
    Proc. European Intelligence and Security Informatics Conf
    2015, pp. 182
    DOI: 10.1109/EISIC.2015.26
    BibTeX
    @inproceedings{Alanazi2015,
     author = {Alanazi, F. and Jones, A.},
     title = {The Value of Metadata in Digital Forensics},
     booktitle = {Proc. European Intelligence and Security Informatics Conf},
     year = {2015},
     pages = {182}}
    
  8. A. Alani & Z. Al-Khanjari
    Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation
    Proc. of the Int. Academic Conf. on Law, Politics & Management
    Al-Khanjari,, 2015
    BibTeX
    @inproceedings{Alani2015,
     author = {Alani, A. and Al-Khanjari, Z.},
     title = {Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation},
     booktitle = {Proc. of the Int. Academic Conf. on Law, Politics & Management},
     journal = {Al-Khanjari,},
     year = {2015}}
    
  9. M. Al-Ani, F. Khelifi, A. Lawgaly & A. Bouridane
    A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification
    Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf
    2015, pp. 1-5
    DOI: 10.1109/AVSS.2015.7301808
    BibTeX
    @inproceedings{Al-Ani2015,
     author = {Al-Ani, Mustafa and Khelifi, Fouad and Lawgaly, Ashref and Bouridane, Ahmed},
     title = {A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification},
     booktitle = {Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf},
     year = {2015},
     pages = {1--5}}
    
  10. A.S. Alfraih, J.A. Briffa & S. Wesemeyer
    Cloning Localization Approach Using K-means Clustering and Support Vector Machine
    Journal of Electronic Imaging, 2015, Vol. 24(4), pp. 043019
    DOI: 10.1117/1.JEI.24.4.043019
    BibTeX
    @article{Alfraih2015,
     author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan},
     title = {Cloning Localization Approach Using K-means Clustering and Support Vector Machine},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {4},
     pages = {043019}}
    
  11. A.S. Alfraih, J.A. Briffa & S. Wesemeyer
    Cloning Localization Based on Feature Extraction and K-means Clustering
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_31
    BibTeX
    @article{Alfraih2015a,
     author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan},
     title = {Cloning Localization Based on Feature Extraction and K-means Clustering},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  12. O.M. Al-Qershi & B.E. Khoo
    Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_37
    BibTeX
    @article{Al-Qershi2015,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  13. R.A. Alsanussi, H.E. Shamardan, Mostafa & S.M. Mostafa
    Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions
    Egyptian Computer Science Journal, ECS, 2015, Vol. 36(6), pp. 80-95
    BibTeX
    @article{Alsanussi2015,
     author = {Alsanussi, Reem A. and Shamardan, Hossam Eldeen and Mostafa and Mostafa, Sami M.},
     title = {Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions},
     journal = {Egyptian Computer Science Journal, ECS},
     year = {2015},
     volume = {36},
     number = {6},
     pages = {80--95}}
    
  14. I. Amerini
    A Feature-based Forensic Procedure for Splicing Forgeries Detection
    Mathematical Problems in Engineering, 2015, Vol. 2015(653164)
    DOI: 10.1155/2015/653164
    BibTeX
    @article{Amerini2015b,
     author = {Amerini, Irene},
     title = {A Feature-based Forensic Procedure for Splicing Forgeries Detection},
     journal = {Mathematical Problems in Engineering},
     year = {2015},
     volume = {2015},
     number = {653164}}
    
  15. I. Amerini, R. Becarelli, B. Bertini & R. Caldelli
    Acquisition Source Identification through a Blind Image Classification
    Image Processing, IET, 2015, Vol. 9(4), pp. 329-337
    DOI: 10.1049/iet-ipr.2014.0316
    BibTeX
    @article{Amerini2015a,
     author = {Amerini, Irene and Becarelli, R. and Bertini, B. and Caldelli, R.},
     title = {Acquisition Source Identification through a Blind Image Classification},
     journal = {Image Processing, IET},
     year = {2015},
     volume = {9},
     number = {4},
     pages = {329--337}}
    
  16. I. Amerini, R. Caldelli, A.D. Bimbo, A.D. Fuccia, A.P. Rizzo & L. Saravo
    Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study
    Forensic Science International, 2015
    DOI: 10.1016/j.forsciint.2015.03.020
    BibTeX
    @article{Amerini2015,
     author = {Amerini, Irene and Caldelli, Roberto and Bimbo, Alberto Del and Fuccia, Andrea Di and Rizzo, Anna Paola and Saravo, Luigi},
     title = {Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study},
     journal = {Forensic Science International},
     year = {2015}}
    
  17. B. Arbab-Zavar, X. Wei, J.D. Bustard, M.S. Nixon & C.-T. Li
    On Forensic Use of Biometrics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 270-304
    DOI: 10.1002/9781118705773.ch7
    BibTeX
    @incollection{Arbab-Zavar2015,
     author = {Arbab-Zavar, Banafshe and Wei, Xingjie and Bustard, John D. and Nixon, Mark S. and Li, Chang-Tsun},
     title = {On Forensic Use of Biometrics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {270--304}}
    
  18. E. Ardizzone, A.R. Bruno & G. Mazzola
    Copy-move Forgery Detection by Matching Triangles of Keypoints
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(10), pp. 2084-2094
    DOI: 10.1109/TIFS.2015.2445742
    BibTeX
    @article{Ardizzone2015a,
     author = {Ardizzone, Edoardo and Bruno, Arcangelo Ranieri. and Mazzola, Giuseppe},
     title = {Copy-move Forgery Detection by Matching Triangles of Keypoints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {10},
     pages = {2084--2094}}
    
  19. E. Ardizzone & G. Mazzola
    A Tool to Support the Creation of Datasets of Tampered Videos
    Image Analysis and Processing — ICIAP 2015
    Springer, 2015, pp. 665-675
    DOI: 10.1007/978-3-319-23234-8_61
    BibTeX
    @incollection{Ardizzone2015,
     author = {Ardizzone, Edoardo and Mazzola, Giuseppe},
     title = {A Tool to Support the Creation of Datasets of Tampered Videos},
     booktitle = {Image Analysis and Processing — ICIAP 2015},
     publisher = {Springer},
     year = {2015},
     pages = {665--675}}
    
  20. M. Arun Anoop
    Image Forgery and Its Detection: A Survey
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-9
    DOI: 10.1109/ICIIECS.2015.7193253
    BibTeX
    @inproceedings{ArunAnoop2015,
     author = {Arun Anoop, M.},
     title = {Image Forgery and Its Detection: A Survey},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--9}}
    
  21. A. Arun, A. Vimala, Y.C. Joshya & C.A. Murugan
    Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination
    International Journal of Advanced Engineering and Global Technology, 2015, Vol. 3(2)
    BibTeX
    @article{Arun2015,
     author = {Arun, Anusree and Vimala, A. and Joshya, Y. Camy and Murugan, C. Arul},
     title = {Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination},
     journal = {International Journal of Advanced Engineering and Global Technology},
     year = {2015},
     volume = {3},
     number = {2}}
    
  22. K. Bahrami, A. Kot, L. Li & H. Li
    Blurred Image Splicing Localization by Exposing Blur Type Inconsistency
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 999-1009
    DOI: 10.1109/TIFS.2015.2394231
    BibTeX
    @article{Bahrami2015,
     author = {Bahrami, K. and Kot, A. and Li, L. and Li, H.},
     title = {Blurred Image Splicing Localization by Exposing Blur Type Inconsistency},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {99},
     pages = {999--1009}}
    
  23. K. Bahrami & A.C. Kot
    Image Splicing Localization Based on Blur Type Inconsistency
    Proc. IEEE Int Circuits and Systems (ISCAS) Symp
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1042-1045
    DOI: 10.1109/ISCAS.2015.7168815
    BibTeX
    @inproceedings{Bahrami2015a,
     author = {Bahrami, K. and Kot, A. C.},
     title = {Image Splicing Localization Based on Blur Type Inconsistency},
     booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1042--1045}}
    
  24. M. Barni, M. Fontani & B. Tondi
    Universal Counterforensics of Multiple Compressed JPEG Images
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_3
    BibTeX
    @article{Barni2015,
     author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta},
     title = {Universal Counterforensics of Multiple Compressed JPEG Images},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  25. A. Bartle & A. Langley
    Analysis of Photo Response Non-uniformity (PRNU)
    Journal of Homicide and Major Incident, 2015, Vol. 10(2), pp. 45-57
    DOI: 10.1016/j.forsciint.2012.12.018
    BibTeX
    @article{Bartle2015,
     author = {Bartle, Anna and Langley, Andy},
     title = {Analysis of Photo Response Non-uniformity (PRNU)},
     journal = {Journal of Homicide and Major Incident},
     year = {2015},
     volume = {10},
     number = {2},
     pages = {45--57}}
    
  26. S. Bayram, H.T. Sencar & N. Memon
    Sensor Fingerprint Identification through Composite Fingerprints and Group Testing
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 597-612
    DOI: 10.1109/TIFS.2014.2385634
    BibTeX
    @article{Bayram2015,
     author = {Bayram, Sevinc and Sencar, H. T. and Memon, N.},
     title = {Sensor Fingerprint Identification through Composite Fingerprints and Group Testing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {597--612}}
    
  27. M.A. Bennet, R.K. Krishna, G.S. Babu & B.S. Jayavignesh
    Performance analysis of forgery detection of JPEG image compression
    Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
    2015, pp. 1-12
    DOI: 10.1109/GET.2015.7453773
    BibTeX
    @inproceedings{Bennet2015,
     author = {Bennet, M. A. and Krishna, R. K. and Babu, G. S. and Jayavignesh, B. S.},
     title = {Performance analysis of forgery detection of JPEG image compression},
     booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)},
     year = {2015},
     pages = {1--12}}
    
  28. F. Bertini, R. Sharma, A. Iannì & D. Montesi
    Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
    Digital Forensics and Cyber Crime, Springer, 2015
    DOI: 10.1007/978-3-319-25512-5_12
    BibTeX
    @article{Bertini2015b,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo},
     title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting},
     journal = {Digital Forensics and Cyber Crime},
     publisher = {Springer},
     year = {2015}}
    
  29. F. Bertini, R. Sharma, A. Iannì & D. Montesi
    Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
    James, J. & Breitinger, F. (ed.)
    Digital Forensics and Cyber Crime
    Springer International Publishing, 2015, Vol. 157, pp. 176-186
    DOI: 10.1007/978-3-319-25512-5_12
    BibTeX
    @incollection{Bertini2015,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo},
     title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting},
     booktitle = {Digital Forensics and Cyber Crime},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {157},
     pages = {176--186}}
    
  30. F. Bertini, R. Sharma, A. Iann\i & D. Montesi
    Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint
    Proceedings of the 19th International Database Engineering &38, Applications Symposium
    ACM, 2015, pp. 23-32
    DOI: 10.1145/2790755.2790765
    BibTeX
    @inproceedings{Bertini2015a,
     author = {Bertini, Flavio and Sharma, Rajesh and Iann\i, Andrea and Montesi, Danilo},
     title = {Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint},
     booktitle = {Proceedings of the 19th International Database Engineering &38, Applications Symposium},
     publisher = {ACM},
     year = {2015},
     pages = {23--32}}
    
  31. X.-L. Bi, C.-M. Pun & X.-C. Yuan
    Over-segmentation Based Image Forgery Detection
    Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)
    2015
    DOI: 10.2991/esac-15.2015.7
    BibTeX
    @inproceedings{Bi2015,
     author = {Bi, Xiu-Li and Pun, Chi-Man and Yuan, Xiao-Chen},
     title = {Over-segmentation Based Image Forgery Detection},
     booktitle = {Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)},
     year = {2015}}
    
  32. T. Bianchi & A. Piva
    Image and Video Processing History Recovery
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 572-611
    DOI: 10.1002/9781118705773.ch15
    BibTeX
    @incollection{Bianchi2015,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Image and Video Processing History Recovery},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {572--611}}
    
  33. P. Binnar & V. Mane
    Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 398-402
    DOI: 10.1109/ICATCCT.2015.7456916
    BibTeX
    @inproceedings{Binnar2015,
     author = {Binnar, P. and Mane, V.},
     title = {Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {398--402}}
    
  34. I.N. Blokhin & S.N. Ilchenko
    Fake As a Format of Modern Journalism: The Information Reliability Problem
    Indian Journal of Science and Technology, 2015, Vol. 8(Special Issue 10)
    DOI: 10.17485/ijst/2015/v8is(10)/84840
    BibTeX
    @article{Blokhin2015,
     author = {Blokhin, Igor Nikolaevich and Ilchenko, Sergey Nikolaevich},
     title = {Fake As a Format of Modern Journalism: The Information Reliability Problem},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {Special Issue 10}}
    
  35. T.K. Boaz & C.J. Prabhakar
    Localization Overlaid Text Based on Noise Inconsistencies
    Advanced Computational Intelligence: An International Journal, 2015
    BibTeX
    @article{Boaz2015,
     author = {Boaz, Too Kipyego and Prabhakar, C. J.},
     title = {Localization Overlaid Text Based on Noise Inconsistencies},
     journal = {Advanced Computational Intelligence: An International Journal},
     year = {2015}}
    
  36. W. Burger & M.J. Burge
    Digital Image Processing: An Algorithmic Introduction Using Java
    Springer, 2015
    DOI: 10.1007/978-1-84800-195-4_1
    BibTeX
    @book{Burger2015,
     author = {Burger, Wilhelm and Burge, Mark J.},
     title = {Digital Image Processing: An Algorithmic Introduction Using Java},
     publisher = {Springer},
     year = {2015},
     edition = {3rd}}
    
  37. R. Caldelli, I. Amerini & A. Costanzo
    SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/eusipco.2015.7362747
    BibTeX
    @inproceedings{Caldelli2015,
     author = {Caldelli, R. and Amerini, Irene and Costanzo, A.},
     title = {SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  38. G. Cao, Y. Chen, G. Zong & Y. Chen
    Detection of copy-move forgery in digital image using locality preserving projections
    Proc. 8th Int. Congress Image and Signal Processing (CISP)
    2015, pp. 599-603
    DOI: 10.1109/CISP.2015.7407949
    BibTeX
    @inproceedings{Cao2015c,
     author = {Cao, G. and Chen, Y. and Zong, G. and Chen, Y.},
     title = {Detection of copy-move forgery in digital image using locality preserving projections},
     booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)},
     year = {2015},
     pages = {599--603}}
    
  39. G. Cao, Y. Wang, Y. Zhao, R. Ni & C. Lin
    On the Security of Image Manipulation Forensics
    Ho, Y.-S., Sang, J., Ro, Y., Kim, J. & Wu, F. (ed.)
    Advances in Multimedia Information Processing - PCM 2015
    Advances in Multimedia Information Processing -- PCM 2015, Springer Science + Business Media, 2015, Vol. 9314, pp. 97-105
    DOI: 10.1007/978-3-319-24075-6_10
    BibTeX
    @incollection{Cao2015b,
     author = {Cao, Gang and Wang, Yongbin and Zhao, Yao and Ni, Rongrong and Lin, Chunyu},
     title = {On the Security of Image Manipulation Forensics},
     booktitle = {Advances in Multimedia Information Processing - PCM 2015},
     journal = {Advances in Multimedia Information Processing -- PCM 2015},
     publisher = {Springer Science + Business Media},
     year = {2015},
     volume = {9314},
     pages = {97--105}}
    
  40. X. Cao, H. Zhao, C. Wang & W. Zhang
    Image Composite Authentication Using a Single Shadow Observation
    Science China Information Sciences, Science China Press, 2015, pp. 1-13
    DOI: 10.1007/s11432-015-5296-8
    BibTeX
    @article{Cao2015a,
     author = {Cao, XiaoChun and Zhao, HanDong and Wang, Chuan and Zhang, Wei},
     title = {Image Composite Authentication Using a Single Shadow Observation},
     journal = {Science China Information Sciences},
     publisher = {Science China Press},
     year = {2015},
     pages = {1--13}}
    
  41. Y. Cao, T. Gao, G. Sheng, L. Fan & L. Gao
    A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.
    J Forensic Sci, College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., 2015, Vol. 60(1), pp. 197-205
    DOI: 10.1111/1556-4029.12618
    BibTeX
    @article{Cao2015,
     author = {Cao, Yanjun and Gao, Tiegang and Sheng, Guorui and Fan, Li and Gao, Lin},
     title = {A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.},
     journal = {J Forensic Sci},
     school = {College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China.},
     year = {2015},
     volume = {60},
     number = {1},
     pages = {197--205}}
    
  42. M. Carnein, P. Schöttle & R. Böhme
    Forensics of High-quality JPEG Images with Color Subsampling
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368556
    BibTeX
    @inproceedings{Carnein2015,
     author = {Carnein, M. and Schöttle, P. and Böhme, R.},
     title = {Forensics of High-quality JPEG Images with Color Subsampling},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  43. M. Carnein, P. Schöttle & R. Böhme
    Forensics of high-quality JPEG images with color subsampling
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368556
    BibTeX
    @inproceedings{Carnein2015a,
     author = {Carnein, M. and Schöttle, P. and Böhme, R.},
     title = {Forensics of high-quality JPEG images with color subsampling},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2015},
     pages = {1--6}}
    
  44. T. Carvalho, F.A. Faria, H. Pedrini, R.S. Torres & A. Rocha
    Illuminant-based Transformed Spaces for Image Forensics
    IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2015.2506548
    BibTeX
    @article{Carvalho2015a,
     author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and Torres, R. S. and Rocha, A.},
     title = {Illuminant-based Transformed Spaces for Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  45. T. Carvalho, H. Farid & E. Kee
    Exposing Photo Manipulation from User-guided 3D Lighting Analysis
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 940902-940902-10
    DOI: 10.1117/12.2075544
    BibTeX
    @inproceedings{Carvalho2015,
     author = {Carvalho, Tiago and Farid, Hany and Kee, Eric},
     title = {Exposing Photo Manipulation from User-guided 3D Lighting Analysis},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {940902-940902-10}}
    
  46. G. Cattaneo, U. Ferraro Petrillo, G. Roscigno & C. Fusco
    A PNU-based Technique to Detect Forged Regions in Digital Images
    Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Advanced Concepts for Intelligent Vision Systems, Springer, 2015, Vol. 9386, pp. 486-498
    DOI: 10.1007/978-3-319-25903-1_42
    BibTeX
    @article{Cattaneo2015,
     author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Roscigno, Gianluca and Fusco, Carmine},
     title = {A PNU-based Technique to Detect Forged Regions in Digital Images},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2015},
     volume = {9386},
     pages = {486--498}}
    
  47. J. Charpe & A. Bhattacharya
    Revealing Image Forgery through Image Manipulation Detection
    Proc. Global Conf. Communication Technologies (GCCT)
    2015, pp. 723-727
    DOI: 10.1109/GCCT.2015.7342759
    BibTeX
    @inproceedings{Charpe2015,
     author = {Charpe, J. and Bhattacharya, A.},
     title = {Revealing Image Forgery through Image Manipulation Detection},
     booktitle = {Proc. Global Conf. Communication Technologies (GCCT)},
     year = {2015},
     pages = {723--727}}
    
  48. B. Chen, G. Coatrieux, J. Wu, Z. Dong, J. Coatrieux & H. Shu
    Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection
    IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 63(20), pp. 5424-5436
    DOI: 10.1109/TSP.2015.2451107
    BibTeX
    @article{Chen2015b,
     author = {Chen, B. and Coatrieux, G. and Wu, J. and Dong, Z. and Coatrieux, J. and Shu, H.},
     title = {Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection},
     journal = {IEEE Transactions on Signal Processing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {63},
     number = {20},
     pages = {5424--5436}}
    
  49. C. Chen & M.C. Stamm
    Camera Model Identification Framework Using an Ensemble of Demosaicing Features
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368573
    BibTeX
    @inproceedings{Chen2015a,
     author = {Chen, Chen and Stamm, M. C.},
     title = {Camera Model Identification Framework Using an Ensemble of Demosaicing Features},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  50. J. Chen, X. Kang, Y. Liu & Z.J. Wang
    Median Filtering Forensics Based on Convolutional Neural Networks
    Signal Processing Letters, IEEE, 2015, Vol. 22(11), pp. 1849-1853
    DOI: 10.1109/LSP.2015.2438008
    BibTeX
    @article{Chen2015,
     author = {Chen, J. and Kang, X. and Liu, Y. and Wang, Z. J.},
     title = {Median Filtering Forensics Based on Convolutional Neural Networks},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {11},
     pages = {1849--1853}}
    
  51. L.M. Chen
    Images, Videos, and Bigdata
    Mathematical Problems in Data Science
    Springer, 2015
    DOI: 10.1007/978-3-319-25127-1_5
    BibTeX
    @incollection{Chen2015c,
     author = {Chen, Li M.},
     title = {Images, Videos, and Bigdata},
     booktitle = {Mathematical Problems in Data Science},
     publisher = {Springer},
     year = {2015}}
    
  52. S. Chen, S. Tan, B. Li & J. Huang
    Automatic Detection of Object-based Forgery in Advanced Video
    IEEE Transactions on Circuits and Systems for Video Technology, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. PP(11), pp. 2138-2151
    DOI: 10.1109/TCSVT.2015.2473436
    BibTeX
    @article{Chen2015d,
     author = {Chen, Shengda and Tan, Shunquan and Li, Bin and Huang, Jiwu},
     title = {Automatic Detection of Object-based Forgery in Advanced Video},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {PP},
     number = {11},
     pages = {2138--2151}}
    
  53. P.K. Chiluka, S.R. Das, M.H. Assaf, S.N. Biswas, S. Morton, E.M. Petriu & V. Groza
    Digital Wavelet Transform Based Image Forgery Detection Using Post -processing
    Proc of SDPS 2015, 2015
    BibTeX
    @article{Chiluka2015,
     author = {Chiluka, Praveen K. and Das, Sunil R. and Assaf, Mansour H. and Biswas, Satyendra N. and Morton, Scott and Petriu, Emil M. and Groza, Voicu},
     title = {Digital Wavelet Transform Based Image Forgery Detection Using Post -processing},
     journal = {Proc of SDPS 2015},
     year = {2015}}
    
  54. Christopher & T.A. Kovashka
    Who’s behind the Camera? Identifying the Authorship of a Photograph
    arXiv, 2015
    BibTeX
    @article{Christopher2015,
     author = {Christopher and Kovashka, Thomas Adriana},
     title = {Who’s behind the Camera? Identifying the Authorship of a Photograph},
     journal = {arXiv},
     year = {2015}}
    
  55. X. Chu
    Fundamental Limits in Multimedia Forensics and Anti-forensics
    Faculty of the Graduate School of the University of Maryland, Department of Electrical and Computer Engineering University of Maryland, 2015
    BibTeX
    @phdthesis{Chu2015a,
     author = {Chu, X.},
     title = {Fundamental Limits in Multimedia Forensics and Anti-forensics},
     school = {Faculty of the Graduate School of the University of Maryland},
     year = {2015}}
    
  56. X. Chu, Y. Chen, M. Stamm & K. Liu
    Information Theoretical Limit of Media Forensics: The Forensicability
    IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2015.2510820
    BibTeX
    @article{Chu2015e,
     author = {Chu, X. and Chen, Y. and Stamm, M. and Liu, K.},
     title = {Information Theoretical Limit of Media Forensics: The Forensicability},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  57. X. Chu, M.C. Stamm, Y. Chen & K.J.R. Liu
    On Antiforensic Concealability with Rate-distortion Tradeoff
    Image Processing, IEEE Transactions on, 2015, Vol. 24(3), pp. 1087-1100
    DOI: 10.1109/TIP.2015.2390137
    BibTeX
    @article{Chu2015,
     author = {Chu, X. and Stamm, M. C. and Chen, Y. and Liu, K. J. R.},
     title = {On Antiforensic Concealability with Rate-distortion Tradeoff},
     journal = {Image Processing, IEEE Transactions on},
     year = {2015},
     volume = {24},
     number = {3},
     pages = {1087--1100}}
    
  58. D. Codreanu, A. Peninou & F. Sedes
    Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework
    Proc. 10th Int Availability, Reliability and Security (ARES) Conf
    2015, pp. 611-617
    DOI: 10.1109/ARES.2015.102
    BibTeX
    @inproceedings{Codreanu2015,
     author = {Codreanu, D. and Peninou, A. and Sedes, F.},
     title = {Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework},
     booktitle = {Proc. 10th Int Availability, Reliability and Security (ARES) Conf},
     year = {2015},
     pages = {611--617}}
    
  59. V. Conotter, P. Comesana & F. Perez-Gonzalez
    Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    Information Forensics and Security, IEEE Transactions on, 2015(99)
    DOI: 10.1109/TIFS.2015.2424195
    BibTeX
    @article{Conotter2015,
     author = {Conotter, V. and Comesana, P. and Perez-Gonzalez, F.},
     title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     number = {99}}
    
  60. V. Conotter, P. Comesaña & F. Pérez-González
    Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(11), pp. 2257-2269
    DOI: 10.1109/TIFS.2015.2424195
    BibTeX
    @article{Conotter2015a,
     author = {Conotter, V. and Comesaña, P. and Pérez-González, F.},
     title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {11},
     pages = {2257--2269}}
    
  61. suisse de la presse Consiglio svizzero della stampa & S.P. Conseil
    Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»
    2015
    BibTeX
    @electronic{SchweizerPresserat2015,
     author = {suisse de la presse Consiglio svizzero della stampa and Conseil, Schweizer Presserat},
     title = {Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»},
     year = {2015}}
    
  62. J.R. Corripio, A.L.S. Orozco & L.J.G. Villalba
    Unsupervised Classification of Mobile Device Images
    ICIT 2015 The 7th International Conference on Information Technology
    2015
    DOI: 10.15849/icit.2015.0014
    BibTeX
    @inproceedings{Corripio2015,
     author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García},
     title = {Unsupervised Classification of Mobile Device Images},
     booktitle = {ICIT 2015 The 7th International Conference on Information Technology},
     year = {2015}}
    
  63. J.R. Corripio, A.L.S. Orozco & L.J.G. Villalba
    New Technique of Forensic Analysis for Digital Cameras in Mobile Devices
    Proc of the 7th International Conference on Information Technology ICIT
    2015
    DOI: 10.15849/icit.2015.0105
    BibTeX
    @inproceedings{Corripio2015a,
     author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García},
     title = {New Technique of Forensic Analysis for Digital Cameras in Mobile Devices},
     booktitle = {Proc of the 7th International Conference on Information Technology ICIT},
     year = {2015}}
    
  64. D. Cozzolino, G. Poggi & L. Verdoliva
    Splicebuster: A New Blind Image Splicing Detector
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368565
    BibTeX
    @inproceedings{Cozzolino2015,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Splicebuster: A New Blind Image Splicing Detector},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  65. D. Cozzolino, G. Poggi & L. Verdoliva
    Efficient Dense-field Copy-move Forgery Detection
    IEEE Transactions on Information Forensics and Security, 2015
    DOI: 10.1109/TIFS.2015.2455334
    BibTeX
    @article{Cozzolino2015a,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Efficient Dense-field Copy-move Forgery Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015}}
    
  66. L. D'Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    Video Forgery Detection and Localization Based on 3D Patchmatch
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169805
    BibTeX
    @inproceedings{DAmiano2015,
     author = {D'Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Video Forgery Detection and Localization Based on 3D Patchmatch},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  67. L. D’Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    Video Forgery Detection and Localization Based on 3D Patchmatch
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf, 2015
    DOI: 10.1109/icmew.2015.7169805
    BibTeX
    @article{D’Amiano2015,
     author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Video Forgery Detection and Localization Based on 3D Patchmatch},
     journal = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015}}
    
  68. P. Dangale, P. Amage, S. Ubale, D. Jadhav & G.M. Gaikwad
    Image Validation by Demosaicing
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(4), pp. 118-121
    DOI: 10.17148/ijarcce.2015.4329
    BibTeX
    @article{Dangale2015,
     author = {Dangale, P. and Amage, P. and Ubale, S. and Jadhav, D. and Gaikwad, G. M.},
     title = {Image Validation by Demosaicing},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {4},
     pages = {118--121}}
    
  69. D.-T. Dang-Nguyen, C. Pasquini, V. Conotter & G. Boato
    Raise: A Raw Images Dataset for Digital Image Forensics
    Proceedings of the 6th ACM Multimedia Systems Conference
    ACM, 2015, pp. 219-224
    DOI: 10.1145/2713168.2713194
    BibTeX
    @inproceedings{Dang-Nguyen2015,
     author = {Dang-Nguyen, Duc-Tien and Pasquini, Cecilia and Conotter, Valentina and Boato, Giulia},
     title = {Raise: A Raw Images Dataset for Digital Image Forensics},
     booktitle = {Proceedings of the 6th ACM Multimedia Systems Conference},
     publisher = {ACM},
     year = {2015},
     pages = {219--224}}
    
  70. R. Davarzani, S. Mozaffari & Kh.Yaghmaie
    Image Authentication Using LBP-based Perceptual Image Hashing
    Journal of AI and Data Mining, 2015
    BibTeX
    @article{Davarzani2015,
     author = {Davarzani, R. and Mozaffari, S. and Kh.Yaghmaie},
     title = {Image Authentication Using LBP-based Perceptual Image Hashing},
     journal = {Journal of AI and Data Mining},
     year = {2015}}
    
  71. A. De Rosa, M. Fontani, M. Massai, A. Piva & M. Barni
    Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics
    Signal Processing Letters, IEEE, 2015, Vol. 22(8), pp. 1132-1136
    DOI: 10.1109/LSP.2015.2389241
    BibTeX
    @article{DeRosa2015,
     author = {De Rosa, A. and Fontani, M. and Massai, M. and Piva, A. and Barni, Mauro},
     title = {Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {8},
     pages = {1132--1136}}
    
  72. L. Debiasi
    A Forensic Analysis of the CASIA-iris V4 Database
    Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, 2015
    BibTeX
    @mastersthesis{Debiasi2015b,
     author = {Debiasi, Luca},
     title = {A Forensic Analysis of the CASIA-iris V4 Database},
     school = {Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg},
     year = {2015}}
    
  73. L. Debiasi & A. Uhl
    Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    2015
    DOI: 10.1109/eusipco.2015.7362489
    BibTeX
    @inproceedings{Debiasi2015,
     author = {Debiasi, Luca and Uhl, Andreas},
     title = {Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     year = {2015}}
    
  74. L. Debiasi & A. Uhl
    Techniques for a Forensic Analysis of the CASia-IRis V4 Database
    Proc. Int Biometrics and Forensics (IWBF) Workshop
    2015, pp. 1-6
    DOI: 10.1109/IWBF.2015.7110236
    BibTeX
    @inproceedings{Debiasi2015a,
     author = {Debiasi, L. and Uhl, A.},
     title = {Techniques for a Forensic Analysis of the CASia-IRis V4 Database},
     booktitle = {Proc. Int Biometrics and Forensics (IWBF) Workshop},
     year = {2015},
     pages = {1--6}}
    
  75. S. Dhevana & C. Jayasri
    A Bayesian Classifier Approach for Glcm Based Image Forgery Detection
    International Journal of Engineering Research & Technology, 2015, Vol. 4(2)
    BibTeX
    @article{Dhevana2015,
     author = {Dhevana, S. and Jayasri, C.},
     title = {A Bayesian Classifier Approach for Glcm Based Image Forgery Detection},
     journal = {International Journal of Engineering Research & Technology},
     year = {2015},
     volume = {4},
     number = {2}}
    
  76. F. Ding, G. Zhu, J. Yang, J. Xie & Y.Q. Shi
    Edge Perpendicular Binary Coding for USM Sharpening Detection
    IEEE Signal Processing Letters, 2015, Vol. 22(3), pp. 327-331
    DOI: 10.1109/LSP.2014.2359033
    BibTeX
    @article{Ding2015,
     author = {Ding, F. and Zhu, G. and Yang, J. and Xie, J. and Shi, Y. Q.},
     title = {Edge Perpendicular Binary Coding for USM Sharpening Detection},
     journal = {IEEE Signal Processing Letters},
     year = {2015},
     volume = {22},
     number = {3},
     pages = {327--331}}
    
  77. A. Ebrahimi, S. Ibrahim, E. Ghazizadeh & M. Alizadeh
    Paint-doctored JPEG Image Forensics Based on Blocking Artifacts
    Proc. Int Computing and Communication (IEMCON) Conf. and Workshop
    2015, pp. 1-5
    DOI: 10.1109/IEMCON.2015.7344427
    BibTeX
    @inproceedings{Ebrahimi2015,
     author = {Ebrahimi, Ali and Ibrahim, Subariah and Ghazizadeh, Eghbal and Alizadeh, Mojtaba},
     title = {Paint-doctored JPEG Image Forensics Based on Blocking Artifacts},
     booktitle = {Proc. Int Computing and Communication (IEMCON) Conf. and Workshop},
     year = {2015},
     pages = {1--5}}
    
  78. A. Ebrahimi, S. Ibrahim, E. Ghazizadeh & M. Alizadeh
    Paint-doctored JPEG image forensics based on blocking artifacts
    Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)
    2015, pp. 1-5
    DOI: 10.1109/IEMCON.2015.7344427
    BibTeX
    @inproceedings{Ebrahimi2015a,
     author = {Ebrahimi, A. and Ibrahim, S. and Ghazizadeh, E. and Alizadeh, M.},
     title = {Paint-doctored JPEG image forensics based on blocking artifacts},
     booktitle = {Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)},
     year = {2015},
     pages = {1--5}}
    
  79. J.G.R. Elwin & G. Kousalya
    Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform
    Indian Journal of Science and Technology, 2015, Vol. 8(S9), pp. 128-139
    DOI: 10.17485/ijst/2015/v8is9/54344
    BibTeX
    @article{Elwin2015,
     author = {Elwin, J. Granty Regina and Kousalya, G.},
     title = {Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {S9},
     pages = {128--139}}
    
  80. M. Emam, Q. Han & X. Niu
    PCET Based Copy-move Forgery Detection in Images under Geometric Transforms
    Multimedia Tools and Applications, Springer US, 2015, pp. 1-15
    DOI: 10.1007/s11042-015-2872-2
    BibTeX
    @article{Emam2015a,
     author = {Emam, Mahmoud and Han, Qi and Niu, Xiamu},
     title = {PCET Based Copy-move Forgery Detection in Images under Geometric Transforms},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2015},
     pages = {1--15}}
    
  81. M. Emam, Q. Han, L. Yu, Y. Zhang & X. Niu
    A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform
    Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)
    Proc. SPIE, 2015, Vol. 9631, pp. 963104-963104-6
    DOI: 10.1117/12.2196997
    BibTeX
    @inproceedings{Emam2015,
     author = {Emam, Mahmoud and Han, Qi and Yu, Liyang and Zhang, Ye and Niu, Xiamu},
     title = {A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform},
     booktitle = {Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9631},
     pages = {963104-963104-6}}
    
  82. G. Fahmy
    Integer DCT Convergence for JPEG-75 Forensics for Images
    Journal of Information Assurance and Security, 2015, Vol. 10, pp. 80-88
    BibTeX
    @article{Fahmy2015a,
     author = {Fahmy, Gamal},
     title = {Integer DCT Convergence for JPEG-75 Forensics for Images},
     journal = {Journal of Information Assurance and Security},
     year = {2015},
     volume = {10},
     pages = {80--88}}
    
  83. G. Fahmy, A. Alqallaf & R. Wurtz
    Phase based detection of JPEG counter forensics
    Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits
    2015, pp. 37-40
    DOI: 10.1109/ICECS.2015.7440243
    BibTeX
    @inproceedings{Fahmy2015b,
     author = {Fahmy, G. and Alqallaf, A. and Wurtz, R.},
     title = {Phase based detection of JPEG counter forensics},
     booktitle = {Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits},
     year = {2015},
     pages = {37--40}}
    
  84. O.M. Fahmy
    An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise
    Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf
    2015, pp. 249-252
    DOI: 10.1109/IWSSIP.2015.7314223
    BibTeX
    @inproceedings{Fahmy2015,
     author = {Fahmy, O. M.},
     title = {An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise},
     booktitle = {Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2015},
     pages = {249--252}}
    
  85. J. Fan, T. Chen & J. Cao
    Image Tampering Detection Using Noise Histogram Features
    Proc. IEEE Int Digital Signal Processing (DSP) Conf
    2015, pp. 1044-1048
    DOI: 10.1109/ICDSP.2015.7252037
    BibTeX
    @inproceedings{Fan2015b,
     author = {Fan, Jiayuan and Chen, Tao and Cao, Jiuwen},
     title = {Image Tampering Detection Using Noise Histogram Features},
     booktitle = {Proc. IEEE Int Digital Signal Processing (DSP) Conf},
     year = {2015},
     pages = {1044--1048}}
    
  86. W. Fan
    Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images
    Université Grenoble Alpes, Université Grenoble Alpes, 2015
    BibTeX
    @phdthesis{Fan2015a,
     author = {Fan, Wei},
     title = {Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images},
     school = {Université Grenoble Alpes},
     year = {2015}}
    
  87. W. Fan, K. Wang & F. Cayre
    General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368606
    BibTeX
    @inproceedings{Fan2015e,
     author = {Fan, W. and Wang, K. and Cayre, F.},
     title = {General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  88. W. Fan, K. Wang & F. Cayre
    General-purpose image forensics using patch likelihood under image statistical models
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368606
    BibTeX
    @inproceedings{Fan2015f,
     author = {Fan, W. and Wang, K. and Cayre, F.},
     title = {General-purpose image forensics using patch likelihood under image statistical models},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2015},
     pages = {1--6}}
    
  89. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 1076-1091
    DOI: 10.1109/TIFS.2015.2398362
    BibTeX
    @article{Fan2015,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {99},
     pages = {1076--1091}}
    
  90. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution
    #IEEE_J_IFS#, 2015, Vol. 10(5), pp. 1076-1091
    DOI: 10.1109/TIFS.2015.2398362
    BibTeX
    @article{Fan2015c,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution},
     journal = {#IEEE_J_IFS#},
     year = {2015},
     volume = {10},
     number = {5},
     pages = {1076--1091}}
    
  91. Y. Fan, P. Carre & C. Fernandez-Maloigne
    Image Splicing Detection with Local Illumination Estimation
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 2940-2944
    DOI: 10.1109/ICIP.2015.7351341
    BibTeX
    @inproceedings{Fan2015d,
     author = {Fan, Yu and Carre, Philippe and Fernandez-Maloigne, Christine},
     title = {Image Splicing Detection with Local Illumination Estimation},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {2940--2944}}
    
  92. S. ..J. .. Fang & H. ..Y. .. Ge
    Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows
    Network Security and Communication Engineering
    Network Security and Communication Engineering, Informa UK Limited, 2015, pp. 313-316
    DOI: 10.1201/b18660-70
    BibTeX
    @incollection{Fang2015,
     author = {Fang, S. . J. . and Ge, H. . Y. .},
     title = {Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows},
     booktitle = {Network Security and Communication Engineering},
     journal = {Network Security and Communication Engineering},
     publisher = {Informa UK Limited},
     year = {2015},
     pages = {313--316}}
    
  93. G.M. Farinella, M.V. Giuffrida, V. Digiacomo & S. Battiato
    On Blind Source Camera Identification
    Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Advanced Concepts for Intelligent Vision Systems, Springer International Publishing, 2015, Vol. 9386, pp. 464-473
    DOI: 10.1007/978-3-319-25903-1_40
    BibTeX
    @incollection{Farinella2015,
     author = {Farinella, Giovanni Maria and Giuffrida, M. V. and Digiacomo, V. and Battiato, Sebastiano},
     title = {On Blind Source Camera Identification},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9386},
     pages = {464--473}}
    
  94. P. Ferrara, M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    Unsupervised Fusion for Forgery Localization Exploiting Background Information
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169770
    BibTeX
    @inproceedings{Ferrara2015,
     author = {Ferrara, P. and Fontani, M. and Bianchi, T. and De Rosa, A. and Piva, A. and Barni, Mauro},
     title = {Unsupervised Fusion for Forgery Localization Exploiting Background Information},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  95. A. Ferreira, L.C. Navarro, G. Pinheiro, J.A. dos Santos & A. Rocha
    Laser Printer Attribution: Exploring New Features and Beyond
    Forensic Science International, Elsevier BV, 2015, Vol. 247(0), pp. 105-125
    DOI: 10.1016/j.forsciint.2014.11.030
    BibTeX
    @article{Ferreira2015,
     author = {Ferreira, Anselmo and Navarro, Luiz C. and Pinheiro, Giuliano and dos Santos, Jefersson A. and Rocha, Anderson},
     title = {Laser Printer Attribution: Exploring New Features and Beyond},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {247},
     number = {0},
     pages = {105--125}}
    
  96. Y. Fusheng & T. Gao
    A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram
    Tan, T., Ruan, Q., Wang, S., Ma, H. & Di, K. (ed.)
    Advances in Image and Graphics Technologies
    Springer Berlin Heidelberg, 2015, Vol. 525, pp. 63-71
    DOI: 10.1007/978-3-662-47791-5_8
    BibTeX
    @incollection{Fusheng2015,
     author = {Fusheng, Yang and Gao, Tiegang},
     title = {A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram},
     booktitle = {Advances in Image and Graphics Technologies},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     volume = {525},
     pages = {63--71}}
    
  97. S. Gao
    A Hybrid Approach for Camera-model Detection
    International Journal of Security and Its Applications, 2015, Vol. 9(8)
    DOI: 10.14257/ijsia.2015.9.8.24
    BibTeX
    @article{Gao2015,
     author = {Gao, Shang},
     title = {A Hybrid Approach for Camera-model Detection},
     journal = {International Journal of Security and Its Applications},
     year = {2015},
     volume = {9},
     number = {8}}
    
  98. L.A. Gatys, A.S. Ecker & M. Bethge
    A Neural Algorithm of Artistic Style
    arXiv, 2015
    BibTeX
    @article{Gatys2015,
     author = {Gatys, Leon A. and Ecker, Alexander S. and Bethge, Matthias},
     title = {A Neural Algorithm of Artistic Style},
     journal = {arXiv},
     year = {2015}}
    
  99. H. Ge & S. Fang
    Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows
    Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015
    2015, pp. 116-121
    DOI: 10.1109/iccss.2015.7281160
    BibTeX
    @inproceedings{Ge2015,
     author = {Ge, Huayong and Fang, Shujuan},
     title = {Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows},
     booktitle = {Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015},
     year = {2015},
     pages = {116--121}}
    
  100. N.I. Glumov, A.V. Kuznetsov & V.V. Myasnikov
    Algorithms for Detection of Plain Copy-move Regions in Digital Images
    Pattern Recognition and Image Analysis, Pleiades Publishing, 2015, Vol. 25(3), pp. 423-429
    DOI: 10.1134/S1054661815030074
    BibTeX
    @article{Glumov2015,
     author = {Glumov, N. I. and Kuznetsov, A. V. and Myasnikov, V. V.},
     title = {Algorithms for Detection of Plain Copy-move Regions in Digital Images},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Pleiades Publishing},
     year = {2015},
     volume = {25},
     number = {3},
     pages = {423--429}}
    
  101. A. Gubrud
    The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery
    Arizona State University, Arizona State University, 2015
    BibTeX
    @mastersthesis{Gubrud2015,
     author = {Gubrud, Aaron},
     title = {The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery},
     school = {Arizona State University},
     year = {2015}}
    
  102. A. Gupta, S. Gupta & A. Mehra
    Video Authentication in Digital Forensic
    Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf
    2015, pp. 659-663
    DOI: 10.1109/ABLAZE.2015.7154945
    BibTeX
    @inproceedings{Gupta2015,
     author = {Gupta, A. and Gupta, S. and Mehra, A.},
     title = {Video Authentication in Digital Forensic},
     booktitle = {Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf},
     year = {2015},
     pages = {659--663}}
    
  103. E. Gürbüz, G. Ulutaş & M. Ulutaş
    Rotation invariant copy move forgery detection method
    Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
    2015, pp. 202-206
    DOI: 10.1109/ELECO.2015.7394451
    BibTeX
    @inproceedings{Guerbuez2015,
     author = {Gürbüz, E. and Ulutaş, G. and Ulutaş, M.},
     title = {Rotation invariant copy move forgery detection method},
     booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)},
     year = {2015},
     pages = {202--206}}
    
  104. F. Hakimi & M. Hariri
    Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm
    Electronics Information & Planning, 2015
    BibTeX
    @article{Hakimi2015,
     author = {Hakimi, Fahime and Hariri, Mahdi},
     title = {Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm},
     journal = {Electronics Information & Planning},
     year = {2015}}
    
  105. F. Hakimi, M. Hariri & F. GharehBaghi
    Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform
    Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
    2015, pp. 1074-1077
    DOI: 10.1109/KBEI.2015.7436195
    BibTeX
    @inproceedings{Hakimi2015a,
     author = {Hakimi, F. and Hariri, M. and GharehBaghi, F.},
     title = {Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform},
     booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)},
     year = {2015},
     pages = {1074--1077}}
    
  106. H. Han, Y. Li, S. Niu & Z. Gong
    Tamper detection based on the consistency of quantization error caused by multiple JPEG compression
    Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)
    2015, pp. 314-319
    DOI: 10.1109/ICCT.2015.7399850
    BibTeX
    @inproceedings{Han2015,
     author = {Han, Hongli and Li, Yezhou and Niu, Shaozhang and Gong, Zhenzhen},
     title = {Tamper detection based on the consistency of quantization error caused by multiple JPEG compression},
     booktitle = {Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)},
     year = {2015},
     pages = {314--319}}
    
  107. F.S. Hashem & G. Sulong
    Passive Aproaches for Detecting Image Tampering: A Review
    Jurnal Teknologi, 2015, Vol. 73(2), pp. 31-36
    DOI: 10.11113/jt.v73.4189
    BibTeX
    @article{Hashem2015,
     author = {Hashem, Fatma Salman and Sulong, Ghazali},
     title = {Passive Aproaches for Detecting Image Tampering: A Review},
     journal = {Jurnal Teknologi},
     year = {2015},
     volume = {73},
     number = {2},
     pages = {31--36}}
    
  108. M.F. Hashmi, A. Hambarde & A. Keskar
    Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets
    2015
    BibTeX
    @electronic{Hashmi2015a,
     author = {Hashmi, M. F. and Hambarde, A. and Keskar, A.},
     title = {Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets},
     year = {2015}}
    
  109. M.F. Hashmi & A.G. Keskar
    Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery
    J Electr Eng Technol., 2015, pp. 709-718
    DOI: 10.5370/jeet.2015.10.4.1886
    BibTeX
    @article{Hashmi2015,
     author = {Hashmi, Mohammad Farukh and Keskar, Avinash G.},
     title = {Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery},
     journal = {J Electr Eng Technol.},
     year = {2015},
     pages = {709--718}}
    
  110. H. Hel-Or & I. Yerushalmy
    Camera-based Image Forgery Detection
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch14
    BibTeX
    @inbook{Hel-Or2015,
     author = {Hel-Or, Hagit and Yerushalmy, Ido},
     title = {Camera-based Image Forgery Detection},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  111. A.T.S. Ho & S. Li
    Digital Image Forensics with Statistical Analysis
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Ho2015,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  112. A.T.S. Ho & S. Li
    Printer and Scanner Forensics
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch10
    BibTeX
    @inbook{Ho2015a,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Printer and Scanner Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  113. A.T.S. Ho & S. Li
    Digital Image Forensics with Statistical Analysis
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Ho2015b,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  114. A.T.S. Ho & S. Li
    Multimedia Analytics for Image Collection Forensics
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch8
    BibTeX
    @inbook{Ho2015c,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Multimedia Analytics for Image Collection Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  115. B. Hoogeboom, I. Alberink & D. Vrijdag
    Photogrammetry in Digital Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch5
    BibTeX
    @inbook{Hoogeboom2015,
     author = {Hoogeboom, Bart and Alberink, Ivo and Vrijdag, Derk},
     title = {Photogrammetry in Digital Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  116. J. Hou & Y. Cheng
    Expose Spliced Photographic Basing on Boundary and Noise Features
    IEICE TRANSACTIONS on Information and Systems, 2015, Vol. E98-D(7)
    DOI: 10.1587/transinf.2014edl8232
    BibTeX
    @article{Hou2015,
     author = {Hou, Jun and Cheng, Yan},
     title = {Expose Spliced Photographic Basing on Boundary and Noise Features},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2015},
     volume = {E98-D},
     number = {7}}
    
  117. C.-M. Hsu, J.-C. Lee & W.-K. Chen
    An Efficient Detection Algorithm for Copy-move Forgery
    Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)
    2015, pp. 33-36
    DOI: 10.1109/AsiaJCIS.2015.16
    BibTeX
    @inproceedings{Hsu2015,
     author = {Hsu, Chen-Ming and Lee, Jen-Chun and Chen, Wei-Kuei},
     title = {An Efficient Detection Algorithm for Copy-move Forgery},
     booktitle = {Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)},
     year = {2015},
     pages = {33--36}}
    
  118. W.-C. Hu, J.-S. Dai & J.-S. Jian
    Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components
    Digital Signal Processing, 2015, Vol. 39(0), pp. 50-62
    DOI: 10.1016/j.dsp.2015.01.006
    BibTeX
    @article{Hu2015,
     author = {Hu, Wu-Chih and Dai, Jing-Siou and Jian, Jhih-Syuan},
     title = {Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components},
     journal = {Digital Signal Processing},
     year = {2015},
     volume = {39},
     number = {0},
     pages = {50--62}}
    
  119. D.-Y. Huang, C.-N. Huang, W.-C. Hu & C.-H. Chou
    Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3152-x
    BibTeX
    @article{Huang2015a,
     author = {Huang, Deng-Yuan and Huang, Ching-Ning and Hu, Wu-Chih and Chou, Chih-Hung},
     title = {Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  120. Y. Huang, J. Zhang & H. Huang
    Camera Model Identification with Unknown Models
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 10(12), pp. 2692-2704
    DOI: 10.1109/TIFS.2015.2474836
    BibTeX
    @article{Huang2015,
     author = {Huang, Y. and Zhang, J. and Huang, H.},
     title = {Camera Model Identification with Unknown Models},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {10},
     number = {12},
     pages = {2692--2704}}
    
  121. T.K. Huynh, K.V. Huynh, T. Le-Tien & S.C. Nguyen
    A Survey on Image Forgery Detection Techniques
    Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on
    2015, pp. 71-76
    DOI: 10.1109/RIVF.2015.7049877
    BibTeX
    @inproceedings{Huynh2015,
     author = {Huynh, Tu K. and Huynh, Khoa V. and Le-Tien, Thuong and Nguyen, Sy C.},
     title = {A Survey on Image Forgery Detection Techniques},
     booktitle = {Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on},
     year = {2015},
     pages = {71--76}}
    
  122. T. Huynh-Kha, T. Le-Tien, S.H. Viet-Uyen & K. Huynh-Van
    The efficiency of applying DWT and feature extraction into copy-move images detection
    Proc. Int. Conf. Advanced Technologies for Communications (ATC)
    2015, pp. 44-49
    DOI: 10.1109/ATC.2015.7388368
    BibTeX
    @inproceedings{Huynh-Kha2015,
     author = {Huynh-Kha, T. and Le-Tien, T. and Viet-Uyen, S. Ha and Huynh-Van, K.},
     title = {The efficiency of applying DWT and feature extraction into copy-move images detection},
     booktitle = {Proc. Int. Conf. Advanced Technologies for Communications (ATC)},
     year = {2015},
     pages = {44--49}}
    
  123. R.W. Ibrahim, Z. Moghaddasi, H.A. Jalab & R.M. Noor
    Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection
    Entropy, 2015, Vol. 17(7), pp. 4775
    DOI: 10.3390/e17074775
    BibTeX
    @article{Ibrahim2015,
     author = {Ibrahim, Rabha W. and Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md},
     title = {Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection},
     journal = {Entropy},
     year = {2015},
     volume = {17},
     number = {7},
     pages = {4775}}
    
  124. M.M. Isaac & M. Wilscy
    Copy-move Forgery Detection Based on Harris Corner Points and BRISK
    Proceedings of the Third International Symposium on Women in Computing and Informatics
    ACM, 2015, pp. 394-399
    DOI: 10.1145/2791405.2791453
    BibTeX
    @inproceedings{Isaac2015,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Copy-move Forgery Detection Based on Harris Corner Points and BRISK},
     booktitle = {Proceedings of the Third International Symposium on Women in Computing and Informatics},
     publisher = {ACM},
     year = {2015},
     pages = {394--399}}
    
  125. M.M. Isaac & M. Wilscy
    Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization
    Procedia Computer Science, 2015, Vol. 58, pp. 76-83
    DOI: 10.1016/j.procs.2015.08.016
    BibTeX
    @article{Isaac2015a,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {58},
     pages = {76--83}}
    
  126. M. Iuliani, G. Fabbri & A. Piva
    Image Splicing Detection Based on General Perspective Constraints
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368598
    BibTeX
    @inproceedings{Iuliani2015,
     author = {Iuliani, M. and Fabbri, G. and Piva, A.},
     title = {Image Splicing Detection Based on General Perspective Constraints},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  127. B.G. Jeong, Y.H. Moon & I.K. Eom
    Blind Identification of Image Manipulation Type Using Mixed Statistical Moments
    Journal of Electronic Imaging, 2015, Vol. 24(1), pp. 013029
    DOI: 10.1117/1.JEI.24.1.013029
    BibTeX
    @article{Jeong2015,
     author = {Jeong, Bo Gyu and Moon, Yong Ho and Eom, Il Kyu},
     title = {Blind Identification of Image Manipulation Type Using Mixed Statistical Moments},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {1},
     pages = {013029}}
    
  128. V. Joshi & S. Jain
    Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques
    Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf
    2015, pp. 1121-1124
    BibTeX
    @inproceedings{Joshi2015,
     author = {Joshi, V. and Jain, S.},
     title = {Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques},
     booktitle = {Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf},
     year = {2015},
     pages = {1121--1124}}
    
  129. T. Julliand, V. Nozick & H. Talbot
    Automated Image Splicing Detection from Noise Estimation in Raw Images
    Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf
    2015, pp. 1-6
    DOI: 10.1049/ic.2015.0111
    BibTeX
    @inproceedings{Julliand2015,
     author = {Julliand, T. and Nozick, V. and Talbot, H.},
     title = {Automated Image Splicing Detection from Noise Estimation in Raw Images},
     booktitle = {Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf},
     year = {2015},
     pages = {1--6}}
    
  130. T. Julliand, V. Nozick & H. Talbot
    Image Noise and Digital Image Forensics
    IWDW
    2015
    DOI: 10.1007/978-3-319-31960-5_1
    BibTeX
    @inproceedings{Julliand2015a,
     author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues},
     title = {Image Noise and Digital Image Forensics},
     booktitle = {IWDW},
     year = {2015}}
    
  131. D.-J. Jung, D.-K. Hyun & H.-K. Lee
    Recaptured Video Detection Based on Sensor Pattern Noise
    EURASIP Journal on Image and Video Processing, Springer, 2015, Vol. 2015(1), pp. 1
    DOI: 10.1186/s13640-015-0096-z
    BibTeX
    @article{Jung2015,
     author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Lee, Heung-Kyu},
     title = {Recaptured Video Detection Based on Sensor Pattern Noise},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2015},
     volume = {2015},
     number = {1},
     pages = {1}}
    
  132. N. Kalka, N. Bartlow, B. Cukic & A. Ross
    A Preliminary Study on Identifying Sensors from Iris Images
    2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/CVPRW.2015.7301319
    BibTeX
    @inproceedings{Kalka2015,
     author = {Kalka, Nathan and Bartlow, Nick and Cukic, Bojan and Ross, Arun},
     title = {A Preliminary Study on Identifying Sensors from Iris Images},
     booktitle = {2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  133. X. Kang, J. Liu, H. Liu & Z.J. Wang
    Forensics and Counter Anti-forensics of Video Inter-frame Forgery
    Multimedia Tools and Applications, 2015, pp. 1-21
    DOI: 10.1007/s11042-015-2762-7
    BibTeX
    @article{Kang2015a,
     author = {Kang, Xiangui and Liu, Jingxian and Liu, Hongmei and Wang, Z. Jane},
     title = {Forensics and Counter Anti-forensics of Video Inter-frame Forgery},
     journal = {Multimedia Tools and Applications},
     year = {2015},
     pages = {1--21}}
    
  134. X. Kang, T. Qin & H. Zeng
    Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 483-487
    DOI: 10.1109/ChinaSIP.2015.7230449
    BibTeX
    @inproceedings{Kang2015,
     author = {Kang, Xiangui and Qin, Tengfei and Zeng, Hui},
     title = {Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {483--487}}
    
  135. A. Karaküçük & A.E. Dirik
    Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution
    Digital Investigation, 2015, Vol. 12(0), pp. 66-76
    DOI: 10.1016/j.diin.2015.01.017
    BibTeX
    @article{Karakuecuek2015,
     author = {Karaküçük, Ahmet and Dirik, Ahmet Emir},
     title = {Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution},
     journal = {Digital Investigation},
     year = {2015},
     volume = {12},
     number = {0},
     pages = {66--76}}
    
  136. A. Karaküçük, A.E. Dirik, H.T. Sencar & N.D. Memon
    Recent Advances in Counter PRNU Based Source Attribution and Beyond
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090N-94090N-11
    DOI: 10.1117/12.2182458
    BibTeX
    @inproceedings{Karakuecuek2015a,
     author = {Karaküçük, Ahmet and Dirik, Ahmet E. and Sencar, Hüsrev T. and Memon, Nasir D.},
     title = {Recent Advances in Counter PRNU Based Source Attribution and Beyond},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090N-94090N-11}}
    
  137. A. Kashyap, B. Suresh, M. Agrawal, H. Gupta & S.D. Joshi
    Detection of Splicing Forgery Using Wavelet Decomposition
    Proc. Int Computing, Communication Automation (ICCCA) Conf
    2015, pp. 843-848
    DOI: 10.1109/CCAA.2015.7148492
    BibTeX
    @inproceedings{Kashyap2015,
     author = {Kashyap, A. and Suresh, B. and Agrawal, M. and Gupta, H. and Joshi, S. D.},
     title = {Detection of Splicing Forgery Using Wavelet Decomposition},
     booktitle = {Proc. Int Computing, Communication Automation (ICCCA) Conf},
     year = {2015},
     pages = {843--848}}
    
  138. C. Kauba & A. Uhl
    Fingerprint Recognition under the Influence of Image Sensor Ageing
    Department of Computer Sciences, University of Salzburg, Department of Computer Sciences, University of Salzburg, 2015
    DOI: 10.1109/iwbf.2016.7449683
    BibTeX
    @techreport{Kauba2015,
     author = {Kauba, Christof and Uhl, Andreas},
     title = {Fingerprint Recognition under the Influence of Image Sensor Ageing},
     school = {Department of Computer Sciences, University of Salzburg},
     year = {2015}}
    
  139. A. Kaur & S. Malhotra
    Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
    IOSR Journal of Computer Engineering (IOSR-JCE), 2015, Vol. 17(3), pp. 47-52
    BibTeX
    @article{Kaur2015,
     author = {Kaur, Amaninder and Malhotra, Sheenam},
     title = {Passive Image Forensic Method to Detect Resampling Forgery in Digital Images},
     journal = {IOSR Journal of Computer Engineering (IOSR-JCE)},
     year = {2015},
     volume = {17},
     number = {3},
     pages = {47--52}}
    
  140. M. Kaur & S. Gupta
    Evaluation of image forensic cues for fusion
    Proc. Third Int. Conf. Image Information Processing (ICIIP)
    2015, pp. 301-305
    DOI: 10.1109/ICIIP.2015.7414785
    BibTeX
    @inproceedings{Kaur2015a,
     author = {Kaur, M. and Gupta, S.},
     title = {Evaluation of image forensic cues for fusion},
     booktitle = {Proc. Third Int. Conf. Image Information Processing (ICIIP)},
     year = {2015},
     pages = {301--305}}
    
  141. R. Kaushik, R.K. Bajaj & J. Mathew
    On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments
    Procedia Computer Science, 2015, Vol. 70, pp. 130-136
    DOI: 10.1016/j.procs.2015.10.058
    BibTeX
    @article{Kaushik2015,
     author = {Kaushik, Rajeev and Bajaj, Rakesh Kumar and Mathew, Jimson},
     title = {On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {70},
     pages = {130--136}}
    
  142. Ke
    An Efficient Blind Detection Algorithm of Median Filtered Image
    International Journal of Hybrid Information Technology, 2015, Vol. 8(1), pp. 181-192
    DOI: 10.14257/ijhit.2015.8.1.16
    BibTeX
    @article{Ke2015,
     author = {Ke},
     title = {An Efficient Blind Detection Algorithm of Median Filtered Image},
     journal = {International Journal of Hybrid Information Technology},
     year = {2015},
     volume = {8},
     number = {1},
     pages = {181--192}}
    
  143. A. Kharboutly, W.P. , G. Subsol & D. Hoa
    Improving Sensor Noise Analysis for CT-scanner Identification
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    2015
    DOI: 10.1109/eusipco.2015.7362817
    BibTeX
    @inproceedings{Kharboutly2015,
     author = {Kharboutly, Anas and , William Puech and Subsol, Gerard and Hoa, Denis},
     title = {Improving Sensor Noise Analysis for CT-scanner Identification},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     year = {2015}}
    
  144. A. Kharboutly, W. Puech, G. Subsol & D. Hoa
    Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images
    Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on
    2015, pp. 325-330
    DOI: 10.1109/IPTA.2015.7367158
    BibTeX
    @inproceedings{Kharboutly2015a,
     author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.},
     title = {Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images},
     booktitle = {Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on},
     year = {2015},
     pages = {325--330}}
    
  145. K. Khuspe & V. Mane
    Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM
    Communication, Information & Computing Technology (ICCICT), 2015 International Conference on
    2015, pp. 1-5
    DOI: 10.1109/ICCICT.2015.7045718
    BibTeX
    @inproceedings{Khuspe2015,
     author = {Khuspe, Kalyani and Mane, Vanita},
     title = {Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM},
     booktitle = {Communication, Information & Computing Technology (ICCICT), 2015 International Conference on},
     year = {2015},
     pages = {1--5}}
    
  146. M. Kirchner
    Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    IS&T/SPIE Electronic Imaging
    2015, Vol. 9409, pp. 940903-940903-12
    DOI: 10.1117/12.2082789
    BibTeX
    @inproceedings{Kirchner2015,
     author = {Kirchner, Matthias},
     title = {Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2015},
     volume = {9409},
     pages = {940903-940903-12}}
    
  147. T.A. Kohale, S.D. Chede & P.R. Lakhe
    Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(1)
    DOI: 10.17148/ijarcce.2015.4129
    BibTeX
    @article{Kohale2015,
     author = {Kohale, Tushant A. and Chede, S. D. and Lakhe, P. R.},
     title = {Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {1}}
    
  148. P. Koniusz & A. Cherian
    Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors
    arxiv, 2015
    BibTeX
    @article{Koniuz2015,
     author = {Koniusz, Piotr and Cherian, Anoop},
     title = {Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors},
     journal = {arxiv},
     year = {2015}}
    
  149. P.A. Koshy & K.N. Nair
    Exposing Image Forgery through Contrast Enhancement
    International Journal of Science and Research (IJSR), 2015, Vol. 4(12), pp. 1044-1048
    DOI: 10.21275/v4i12.nov152185
    BibTeX
    @article{Koshy2015,
     author = {Koshy, Priya Ann and Nair, Kavitha N.},
     title = {Exposing Image Forgery through Contrast Enhancement},
     journal = {International Journal of Science and Research (IJSR)},
     year = {2015},
     volume = {4},
     number = {12},
     pages = {1044--1048}}
    
  150. P. Kovesi
    Good Colour Maps: How to Design Them
    arXiv:1509.03700, 2015
    BibTeX
    @article{Kovesi2015,
     author = {Kovesi, Peter},
     title = {Good Colour Maps: How to Design Them},
     journal = {arXiv:1509.03700},
     year = {2015}}
    
  151. C. Kraetzer & J. Dittmann
    Considerations on the Benchmarking of Media Forensics
    Proc. 23rd European Signal Processing Conf. (EUSIPCO)
    2015, pp. 61-65
    DOI: 10.1109/EUSIPCO.2015.7362345
    BibTeX
    @inproceedings{Kraetzer2015,
     author = {Kraetzer, C. and Dittmann, J.},
     title = {Considerations on the Benchmarking of Media Forensics},
     booktitle = {Proc. 23rd European Signal Processing Conf. (EUSIPCO)},
     year = {2015},
     pages = {61--65}}
    
  152. C. Kraetzer & J. Dittmann
    Microphone Forensics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 411-441
    DOI: 10.1002/9781118705773.ch11
    BibTeX
    @incollection{Kraetzer2015a,
     author = {Kraetzer, Christian and Dittmann, Jana},
     title = {Microphone Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {411--441}}
    
  153. N. Kulkarni & V. Mane
    Source Camera Identification Using GLCM
    Proc. IEEE Int. Advance Computing Conf. (IACC)
    2015, pp. 1242-1246
    DOI: 10.1109/IADCC.2015.7154900
    BibTeX
    @inproceedings{Kulkarni2015,
     author = {Kulkarni, Nilambari and Mane, Vanita},
     title = {Source Camera Identification Using GLCM},
     booktitle = {Proc. IEEE Int. Advance Computing Conf. (IACC)},
     year = {2015},
     pages = {1242--1246}}
    
  154. S. Kumar, J.V. Desai & S. Mukherjee
    Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors
    I.J. Image, Graphics and Signal Processing, 2015(6), pp. 38-44
    DOI: 10.5815/ijigsp.2015.06.05
    BibTeX
    @article{Kumar2015,
     author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev},
     title = {Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015},
     number = {6},
     pages = {38--44}}
    
  155. Y.-N. Lai, T.-G. Gao, J.-X. Li & G.-R. Sheng
    Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern
    Huang, D.-S., Bevilacqua, V. & Premaratne, P. (ed.)
    Intelligent Computing Theories and Methodologies
    Springer International Publishing, 2015, Vol. 9225, pp. 421-432
    DOI: 10.1007/978-3-319-22180-9_41
    BibTeX
    @incollection{Lai2015,
     author = {Lai, Yun-Ni and Gao, Tie-Gang and Li, Jia-Xin and Sheng, Guo-Rui},
     title = {Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern},
     booktitle = {Intelligent Computing Theories and Methodologies},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9225},
     pages = {421--432}}
    
  156. K.-f. Lau, N.-f. Law & W.-c. Siu
    Use of Sensor Noise for Source Identification
    Proc. Int Noise and Fluctuations (ICNF) Conf
    Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/ICNF.2015.7288548
    BibTeX
    @inproceedings{Lau2015,
     author = {Lau, Kwun-fung and Law, Ngai-fong and Siu, Wan-chi},
     title = {Use of Sensor Noise for Source Identification},
     booktitle = {Proc. Int Noise and Fluctuations (ICNF) Conf},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  157. J.-C. Lee
    Copy-move Image Forgery Detection Based on Gabor Magnitude
    Journal of Visual Communication and Image Representation, 2015, Vol. 31, pp. 320-334
    DOI: 10.1016/j.jvcir.2015.07.007
    BibTeX
    @article{Lee2015b,
     author = {Lee, Jen-Chun},
     title = {Copy-move Image Forgery Detection Based on Gabor Magnitude},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     volume = {31},
     pages = {320--334}}
    
  158. J.-C. Lee, C.-P. Chang & W.-K. Chen
    Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients
    Information Sciences, 2015(0), pp. -
    DOI: 10.1016/j.ins.2015.03.009
    BibTeX
    @article{Lee2015,
     author = {Lee, Jen-Chun and Chang, Chien-Ping and Chen, Wei-Kuei},
     title = {Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients},
     journal = {Information Sciences},
     year = {2015},
     number = {0},
     pages = {-}}
    
  159. S.-H. Lee, T.-W. Oh, K. Kim & H.-Y. Lee
    Digital Camera Identification Using Sensor Pattern Noise
    Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)
    2015, pp. 30-35
    BibTeX
    @inproceedings{Lee2015a,
     author = {Lee, Sang-Hyeong and Oh, Tae-Woo and Kim, Kibom and Lee, Hae-Yeoun},
     title = {Digital Camera Identification Using Sensor Pattern Noise},
     booktitle = {Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)},
     year = {2015},
     pages = {30--35}}
    
  160. M.D. Leom, C.J. DOrazio, G. Deegan & K.K.R. Choo
    Forensic Collection and Analysis of Thumbnails in Android
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2015, Vol. 1, pp. 1059-1066
    DOI: 10.1109/Trustcom.2015.483
    BibTeX
    @inproceedings{Leom2015,
     author = {Leom, M. D. and DOrazio, C. J. and Deegan, G. and Choo, K. K. R.},
     title = {Forensic Collection and Analysis of Thumbnails in Android},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2015},
     volume = {1},
     pages = {1059--1066}}
    
  161. J. Lepsoy, S. Kim, D. Atnafu & H.J. Kim
    Metadata protection scheme for JPEG privacy security using hierarchical and group-based models
    Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)
    2015, pp. 1-5
    DOI: 10.1109/ICTA.2015.7426905
    BibTeX
    @inproceedings{Lepsoy2015,
     author = {Lepsoy, J. and Kim, S. and Atnafu, D. and Kim, H. J.},
     title = {Metadata protection scheme for JPEG privacy security using hierarchical and group-based models},
     booktitle = {Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)},
     year = {2015},
     pages = {1--5}}
    
  162. T. Le-Tien, T. Huynh-Ngoc, T. Huynh-Kha & L. Marie
    Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors
    Gervasi, O., Murgante, B., Misra, S., Gavrilova, M. L., Rocha, A. M. A. C., Torre, C., Taniar, D. & Apduhan, B. O. (ed.)
    Computational Science and Its Applications -- ICCSA 2015
    Springer International Publishing, 2015, Vol. 9158, pp. 458-475
    DOI: 10.1007/978-3-319-21410-8_36
    BibTeX
    @incollection{Le-Tien2015,
     author = {Le-Tien, Thuong and Huynh-Ngoc, Tan and Huynh-Kha, Tu and Marie, Luong},
     title = {Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors},
     booktitle = {Computational Science and Its Applications -- ICCSA 2015},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9158},
     pages = {458--475}}
    
  163. B. Li, T.T. Ng, X. Li, S. Tan & J. Huang
    Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation
    IEEE Transactions on Image Processing, 2015, Vol. 24(5), pp. 1471-1484
    DOI: 10.1109/TIP.2015.2405477
    BibTeX
    @article{Li2015g,
     author = {Li, B. and Ng, T. T. and Li, X. and Tan, S. and Huang, J.},
     title = {Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation},
     journal = {IEEE Transactions on Image Processing},
     year = {2015},
     volume = {24},
     number = {5},
     pages = {1471--1484}}
    
  164. B. Li, T.-T. Ng, X. Li, S. Tan & J. Huang
    Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 558-573
    DOI: 10.1109/TIFS.2015.2389148
    BibTeX
    @article{Li2015a,
     author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu},
     title = {Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {558--573}}
    
  165. C. Li, Q. Ma, L. Xiao, M. Li & A. Zhang
    Image Splicing Detection Based on Markov Features in Qdct Domain
    Huang, D.-S., Jo, K.-H. & Hussain, A. (ed.)
    Intelligent Computing Theories and Methodologies
    Advanced Intelligent Computing Theories and Applications, Springer International Publishing, 2015, Vol. 9226, pp. 170-176
    DOI: 10.1007/978-3-319-22186-1_17
    BibTeX
    @incollection{Li2015c,
     author = {Li, Ce and Ma, Qiang and Xiao, Limei and Li, Ming and Zhang, Aihua},
     title = {Image Splicing Detection Based on Markov Features in Qdct Domain},
     booktitle = {Intelligent Computing Theories and Methodologies},
     journal = {Advanced Intelligent Computing Theories and Applications},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9226},
     pages = {170--176}}
    
  166. J. Li, X. Li, B. Yang & X. Sun
    Segmentation-based Image Copy-move Forgery Detection Scheme
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 507-518
    DOI: 10.1109/TIFS.2014.2381872
    BibTeX
    @article{Li2015,
     author = {Li, Jian and Li, Xiaolong and Yang, Bin and Sun, Xingming},
     title = {Segmentation-based Image Copy-move Forgery Detection Scheme},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {507--518}}
    
  167. J. Li, Y. Zhao & R. Ni
    Detection of Seam Carving and Contrast Enhancement Operation Chain
    Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
    2015, pp. 235-238
    DOI: 10.1109/IIH-MSP.2015.89
    BibTeX
    @inproceedings{Li2015i,
     author = {Li, J. and Zhao, Y. and Ni, R.},
     title = {Detection of Seam Carving and Contrast Enhancement Operation Chain},
     booktitle = {Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)},
     year = {2015},
     pages = {235--238}}
    
  168. R. Li, C. Kotropoulos, C.T. Li & Y. Guan
    Random Subspace Method for Source Camera Identification
    Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)
    2015, pp. 1-5
    DOI: 10.1109/MLSP.2015.7324339
    BibTeX
    @inproceedings{Li2015f,
     author = {Li, R. and Kotropoulos, C. and Li, C. T. and Guan, Y.},
     title = {Random Subspace Method for Source Camera Identification},
     booktitle = {Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)},
     year = {2015},
     pages = {1--5}}
    
  169. R. Li, C.-T. Li & Y. Guan
    A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching
    Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
    2015, pp. 1777-1781
    DOI: 10.1109/ICASSP.2015.7178276
    BibTeX
    @inproceedings{Li2015d,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching},
     booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf},
     year = {2015},
     pages = {1777--1781}}
    
  170. R. Li, C.-T. Li & Y. Guan
    Incremental Update of Feature Extractor for Camera Identification
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 324-328
    DOI: 10.1109/ICIP.2015.7350813
    BibTeX
    @inproceedings{Li2015e,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {Incremental Update of Feature Extractor for Camera Identification},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {324--328}}
    
  171. S. Li, M.K. Dhami & A.T.S. Ho
    Standards and Best Practices in Digital and Multimedia Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 2
    Wiley-IEEE Press, 2015, pp. 38-93
    DOI: 10.1002/9781118705773.ch2
    BibTeX
    @inbook{Li2015j,
     author = {Li, Shujun and Dhami, Mandeep K. and Ho, Anthony T. S.},
     title = {Standards and Best Practices in Digital and Multimedia Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {38--93}}
    
  172. S. Li & A.T.S. Ho
    Digital Forensics Laboratories in Operation
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 1
    Wiley-IEEE Press, 2015, pp. 1-37
    DOI: 10.1002/9781118705773.ch1
    BibTeX
    @inbook{Li2015k,
     author = {Li, Shujun and Ho, Anthony T. S.},
     title = {Digital Forensics Laboratories in Operation},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {1--37}}
    
  173. Y. Li & J. Zhou
    Anti-forensics of Lossy Predictive Image Compression
    Signal Processing Letters, IEEE, 2015, Vol. 22(12), pp. 2219-2223
    DOI: 10.1109/LSP.2015.2472561
    BibTeX
    @article{Li2015b,
     author = {Li, Yuanman and Zhou, Jiantao},
     title = {Anti-forensics of Lossy Predictive Image Compression},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {12},
     pages = {2219--2223}}
    
  174. Y. Li & J. Zhou
    Anti-Forensics of Lossy Predictive Image Compression
    #IEEE_J_SPL#, 2015, Vol. 22(12), pp. 2219-2223
    DOI: 10.1109/LSP.2015.2472561
    BibTeX
    @article{Li2015h,
     author = {Li, Y. and Zhou, J.},
     title = {Anti-Forensics of Lossy Predictive Image Compression},
     journal = {#IEEE_J_SPL#},
     year = {2015},
     volume = {22},
     number = {12},
     pages = {2219--2223}}
    
  175. Z. Liang, G. Yang, X. Ding & L. Li
    An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting
    Journal of Visual Communication and Image Representation, 2015(0), pp. -
    DOI: 10.1016/j.jvcir.2015.03.004
    BibTeX
    @article{Liang2015,
     author = {Liang, Zaoshan and Yang, Gaobo and Ding, Xiangling and Li, Leida},
     title = {An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     number = {0},
     pages = {-}}
    
  176. C.S. Lin, C.C. Chen & Y.C. Chang
    An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection
    Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf
    2015, pp. 228-231
    DOI: 10.1109/INCoS.2015.90
    BibTeX
    @inproceedings{Lin2015,
     author = {Lin, C. S. and Chen, C. C. and Chang, Y. C.},
     title = {An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection},
     booktitle = {Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf},
     year = {2015},
     pages = {228--231}}
    
  177. B. Liu & C.-M. Pun
    Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies
    International Journal of Computer and Communication Engineering, 2015, Vol. 4(1), pp. 33-38
    DOI: 10.7763/IJCCE.2015.V4.378
    BibTeX
    @article{Liu2015,
     author = {Liu, Bo and Pun, Chi-Man},
     title = {Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies},
     journal = {International Journal of Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {1},
     pages = {33--38}}
    
  178. B.-b. Liu, X. Wei & J. Yan
    Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation
    Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
    DOI: 10.1145/2756601.2756614
    BibTeX
    @article{Liu2015b,
     author = {Liu, Bei-bei and Wei, Xingjie and Yan, Jeff},
     title = {Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation},
     journal = {Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security},
     year = {2015}}
    
  179. Q. Liu, A. Sung, Z. Chen & L. Chen
    Exposing Image Tampering with the Same Quantization Matrix
    Baughman, A. K., Gao, J., Pan, J.-Y. & Petrushin, V. A. (ed.)
    Multimedia Data Mining and Analytics
    Springer International Publishing, 2015, pp. 327-343
    DOI: 10.1007/978-3-319-14998-1_15
    BibTeX
    @incollection{Liu2015a,
     author = {Liu, Qingzhong and Sung, AndrewH. and Chen, Zhongxue and Chen, Lei},
     title = {Exposing Image Tampering with the Same Quantization Matrix},
     booktitle = {Multimedia Data Mining and Analytics},
     publisher = {Springer International Publishing},
     year = {2015},
     pages = {327--343}}
    
  180. Y. Liu & T. Huang
    Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis
    Multimedia Systems, Springer Berlin Heidelberg, 2015, pp. 1-16
    DOI: 10.1007/s00530-015-0478-1
    BibTeX
    @article{Liu2015c,
     author = {Liu, Yuqing and Huang, Tianqiang},
     title = {Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis},
     journal = {Multimedia Systems},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     pages = {1--16}}
    
  181. B. Mahdian, A. Novozamsky & S. Saic
    Detecting Cyclostationarity in Re-captured LCD Screens
    Forensic Research, 2015
    DOI: 10.1109/icip.2015.7350872
    BibTeX
    @article{Mahdian2015a,
     author = {Mahdian, Babak and Novozamsky, Adam and Saic, Stanislav},
     title = {Detecting Cyclostationarity in Re-captured LCD Screens},
     journal = {Forensic Research},
     year = {2015}}
    
  182. B. Mahdian, A. Novozámský & S. Saic
    Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
    Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
    Digital-Forensics and Watermarking
    Springer International Publishing, 2015, Vol. 9023, pp. 47-59
    DOI: 10.1007/978-3-319-19321-2_4
    BibTeX
    @incollection{Mahdian2015,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint},
     booktitle = {Digital-Forensics and Watermarking},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9023},
     pages = {47--59}}
    
  183. B. Mahdian, A. Novozámský & S. Saic
    Identification of Aliasing-based Patterns in Re-captured LCD Screens
    ICIP
    2015
    BibTeX
    @inproceedings{Mahdian2015b,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Identification of Aliasing-based Patterns in Re-captured LCD Screens},
     booktitle = {ICIP},
     year = {2015}}
    
  184. B. Mahdian, A. Novozámský & S. Saic
    Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
    Digital-Forensics and Watermarking
    Digital-Forensics and Watermarking, Springer, 2015, pp. 47-59
    DOI: 10.1007/978-3-319-19321-2_4
    BibTeX
    @article{Mahdian2015c,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint},
     booktitle = {Digital-Forensics and Watermarking},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015},
     pages = {47--59}}
    
  185. T. Mahmood, T. Nawaz, R. Ashraf, M. Shah, Z. Khan, A. Irtaza & Z. Mehmood
    A Survey on Block Based Copy Move Image Forgery Detection Techniques
    Emerging Technologies (ICET), 2015 International Conference on
    2015, pp. 1-6
    DOI: 10.1109/ICET.2015.7389169
    BibTeX
    @inproceedings{Mahmood2015,
     author = {Mahmood, T. and Nawaz, T. and Ashraf, R. and Shah, M. and Khan, Z. and Irtaza, A. and Mehmood, Z.},
     title = {A Survey on Block Based Copy Move Image Forgery Detection Techniques},
     booktitle = {Emerging Technologies (ICET), 2015 International Conference on},
     year = {2015},
     pages = {1--6}}
    
  186. P. Malik & K. Karthik
    Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images
    Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf
    2015, pp. 1421-1427
    DOI: 10.1109/ICACCI.2015.7275812
    BibTeX
    @inproceedings{Malik2015,
     author = {Malik, Parveen and Karthik, Kannan},
     title = {Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images},
     booktitle = {Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf},
     year = {2015},
     pages = {1421--1427}}
    
  187. A.V. Malviya & S.A. Ladhake
    Copy move forgery detection using low complexity feature extraction
    Proc. IEEE UP Section Conf. Electrical Computer and Electronics (UPCON)
    2015, pp. 1-5
    DOI: 10.1109/UPCON.2015.7456688
    BibTeX
    @inproceedings{Malviya2015,
     author = {Malviya, A. V. and Ladhake, S. A.},
     title = {Copy move forgery detection using low complexity feature extraction},
     booktitle = {Proc. IEEE UP Section Conf. Electrical Computer and Electronics (UPCON)},
     year = {2015},
     pages = {1--5}}
    
  188. V.T. Manu & B.M. Mehtre
    Visual Artifacts Based Image Splicing Detection in Uncompressed Images
    Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics
    2015, Vol. 11/16, pp. 145-150
    DOI: 10.1109/CGVIS.2015.7449911
    BibTeX
    @inproceedings{Manu2015,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Visual Artifacts Based Image Splicing Detection in Uncompressed Images},
     booktitle = {Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics},
     year = {2015},
     volume = {11/16},
     pages = {145--150}}
    
  189. F. Marra, G. Poggi, F. Roli, C. Sansone & L. Verdoliva
    Counter-forensics in Machine Learning Based Forgery Detection
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090L-94090L-11
    DOI: 10.1117/12.2182173
    BibTeX
    @inproceedings{Marra2015,
     author = {Marra, Francesco and Poggi, Giovanni and Roli, Fabio and Sansone, Carlo and Verdoliva, Luisa},
     title = {Counter-forensics in Machine Learning Based Forgery Detection},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090L-94090L-11}}
    
  190. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Evaluation of Residual-based Local Features for Camera Model Identification
    New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops
    New Trends in Image Analysis and Processing, Springer Science + Business Media, 2015, pp. 11-18
    DOI: 10.1007/978-3-319-23222-5_2
    BibTeX
    @incollection{Marra2015a,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {Evaluation of Residual-based Local Features for Camera Model Identification},
     booktitle = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops},
     journal = {New Trends in Image Analysis and Processing},
     publisher = {Springer Science + Business Media},
     year = {2015},
     pages = {11--18}}
    
  191. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Evaluation of Residual-based Local Features for Camera Model Identification
    New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops, Springer, 2015
    DOI: 10.1007/978-3-319-23222-5_2
    BibTeX
    @article{Marra2015b,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {Evaluation of Residual-based Local Features for Camera Model Identification},
     journal = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops},
     publisher = {Springer},
     year = {2015}}
    
  192. F. Marturana, S. Tacconi & G.F. Italiano
    A Machine Learning-Based Approach to Digital Triage
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 94-132
    DOI: 10.1002/9781118705773.ch3
    BibTeX
    @inbook{Marturana2015,
     author = {Marturana, Fabio and Tacconi, Simone and Italiano, Giuseppe F.},
     title = {A Machine Learning-Based Approach to Digital Triage},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {94--132}}
    
  193. O. Mayer & M.C. Stamm
    Anti-forensics of Chromatic Aberration
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090M-94090M-9
    DOI: 10.1117/12.2182457
    BibTeX
    @inproceedings{Mayer2015,
     author = {Mayer, Owen and Stamm, Matthew C.},
     title = {Anti-forensics of Chromatic Aberration},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090M-94090M-9}}
    
  194. A. Meenakshi Sundaram & C. Nandini
    CBFD: Coherence Based Forgery Detection technique in image forensics analysis
    Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
    2015, pp. 192-197
    DOI: 10.1109/ERECT.2015.7499011
    BibTeX
    @inproceedings{MeenakshiSundaram2015,
     author = {Meenakshi Sundaram, A. and Nandini, C.},
     title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis},
     booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics},
     year = {2015},
     pages = {192--197}}
    
  195. A. Meenakshi Sundaram & C. Nandini
    CBFD: Coherence Based Forgery Detection technique in image forensics analysis
    Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
    2015, pp. 192-197
    DOI: 10.1109/ERECT.2015.7499011
    BibTeX
    @inproceedings{MeenakshiSundaram2015a,
     author = {Meenakshi Sundaram, A. and Nandini, C.},
     title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis},
     booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics},
     year = {2015},
     pages = {192--197}}
    
  196. A.V. Mire, S.B. Dhok, N.J. Mistry & P.D. Porey
    Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images
    Procedia Computer Science, 2015, Vol. 54, pp. 690-696
    DOI: 10.1016/j.procs.2015.06.081
    BibTeX
    @article{Mire2015,
     author = {Mire, Archana V. and Dhok, S. B. and Mistry, N. J. and Porey, P. D.},
     title = {Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {54},
     pages = {690--696}}
    
  197. Z. Moghaddasi, H.A. Jalab & R.M. Noor
    A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 13-14
    DOI: 10.1109/ICCE-TW.2015.7216815
    BibTeX
    @inproceedings{Moghaddasi2015,
     author = {Moghaddasi, Z. and Jalab, H. A. and Noor, R. M.},
     title = {A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {13--14}}
    
  198. E. Mohebbian & M. Hariri
    Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images
    Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
    2015, pp. 436-440
    DOI: 10.1109/KBEI.2015.7436084
    BibTeX
    @inproceedings{Mohebbian2015,
     author = {Mohebbian, E. and Hariri, M.},
     title = {Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images},
     booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)},
     year = {2015},
     pages = {436--440}}
    
  199. M. Moltisanti, A. Paratore, S. Battiato & L. Saravo
    Image Manipulation on Facebook for Forensics Evidence
    Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, 2015
    BibTeX
    @techreport{Moltisanti2015,
     author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi},
     title = {Image Manipulation on Facebook for Forensics Evidence},
     school = {Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania},
     year = {2015}}
    
  200. M. Moltisanti, A. Paratore, S. Battiato & L. Saravo
    Image Manipulation on Facebook for Forensics Evidence
    Image Analysis and Processing — ICIAP 2015
    Springer, 2015, pp. 506-517
    DOI: 10.1007/978-3-319-23234-8_47
    BibTeX
    @incollection{Moltisanti2015a,
     author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi},
     title = {Image Manipulation on Facebook for Forensics Evidence},
     booktitle = {Image Analysis and Processing — ICIAP 2015},
     publisher = {Springer},
     year = {2015},
     pages = {506--517}}
    
  201. P. Mookdarsanit, L. Soimart, M. Ketcham & N. Hnoohom
    Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
    Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
    2015, pp. 613-616
    DOI: 10.1109/SITIS.2015.78
    BibTeX
    @inproceedings{Mookdarsanit2015,
     author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.},
     title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics},
     booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)},
     year = {2015},
     pages = {613--616}}
    
  202. P. Mookdarsanit, L. Soimart, M. Ketcham & N. Hnoohom
    Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
    Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
    2015, pp. 613-616
    DOI: 10.1109/SITIS.2015.78
    BibTeX
    @inproceedings{Mookdarsanit2015a,
     author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.},
     title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics},
     booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)},
     year = {2015},
     pages = {613--616}}
    
  203. A.M. Moussa
    A Fast and Accurate Algorithm for Copy-move Forgery Detection
    Computer Engineering Systems (ICCES), 2015 Tenth International Conference on
    2015, pp. 281-285
    DOI: 10.1109/ICCES.2015.7393060
    BibTeX
    @inproceedings{Moussa2015,
     author = {Moussa, A. M.},
     title = {A Fast and Accurate Algorithm for Copy-move Forgery Detection},
     booktitle = {Computer Engineering Systems (ICCES), 2015 Tenth International Conference on},
     year = {2015},
     pages = {281--285}}
    
  204. R. Ni, Y. Zhao & X. Zhai
    Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features
    Journal of Information Hiding and Multimedia Signal Processing, 2015, Vol. 6(2), pp. 323-333
    BibTeX
    @article{Ni2015,
     author = {Ni, Rongrong and Zhao, Yao and Zhai, Xiaobo},
     title = {Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2015},
     volume = {6},
     number = {2},
     pages = {323--333}}
    
  205. N. Nirmalkar, S. Kamble & S. Kakde
    A Review of Image Forgery Techniques and Their Detection
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICIIECS.2015.7193177
    BibTeX
    @inproceedings{Nirmalkar2015,
     author = {Nirmalkar, N. and Kamble, S. and Kakde, S.},
     title = {A Review of Image Forgery Techniques and Their Detection},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--5}}
    
  206. E. Nowroozi & A. Zakerolhosseini
    Double JPEG Compression Detection Using Statistical Analysis
    dvances in Computer Science: an International Journal, 2015, Vol. 4(15), pp. 70-76
    BibTeX
    @article{Nowroozi2015,
     author = {Nowroozi, Ehsan and Zakerolhosseini, Ali},
     title = {Double JPEG Compression Detection Using Statistical Analysis},
     journal = {dvances in Computer Science: an International Journal},
     year = {2015},
     volume = {4},
     number = {15},
     pages = {70--76}}
    
  207. P.A. Nugraha, R.W. Ciptasari & B. Pudjoatmojo
    A photo composite detection based on eye specular highlights using pixel-based approach
    Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf
    2015, pp. 195-200
    DOI: 10.1109/ICoICT.2015.7231421
    BibTeX
    @inproceedings{Nugraha2015,
     author = {Nugraha, P. A. and Ciptasari, R. W. and Pudjoatmojo, B.},
     title = {A photo composite detection based on eye specular highlights using pixel-based approach},
     booktitle = {Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf},
     year = {2015},
     pages = {195--200}}
    
  208. A.L.S. Orozco, L.J.G. Villalba, D.M.A. González, J.R. Corripio, J. Hernandez-Castro & S.J. Gibson
    Smartphone Image Acquisition Forensics Using Sensor Fingerprint
    IET Computer Vision, 2015
    DOI: 10.1049/iet-cvi.2014.0243
    BibTeX
    @article{Orozco2015,
     author = {Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García and González, David Manuel Arenas and Corripio, Jocelin Rosales and Hernandez-Castro, Julio and Gibson, Stuart James},
     title = {Smartphone Image Acquisition Forensics Using Sensor Fingerprint},
     journal = {IET Computer Vision},
     year = {2015}}
    
  209. A.L.S. Orozco, L.J.G. Villalba, D.M.A. González, J.R. Corripio, J. Hernandez-Castro & S.J. Gibson
    Smartphone image acquisition forensics using sensor fingerprint
    IET Comput Vision, 2015, Vol. 9(5), pp. 723-731
    DOI: 10.1049/iet-cvi.2014.0243
    BibTeX
    @article{Orozco2015a,
     author = {Orozco, A. L. Sandoval and Villalba, L. J. García and González, D. M. Arenas and Corripio, J. R. and Hernandez-Castro, J. and Gibson, S. J.},
     title = {Smartphone image acquisition forensics using sensor fingerprint},
     journal = {IET Comput Vision},
     year = {2015},
     volume = {9},
     number = {5},
     pages = {723--731}}
    
  210. J. Ou & J. Ni
    Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images
    Proc. SPIE, 2015, Vol. 9811, pp. 98110L-98110L-9
    DOI: 10.1117/12.2205468
    BibTeX
    @article{Ou2015,
     author = {Ou, Junhai and Ni, Jiangqun},
     title = {Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9811},
     pages = {98110L-98110L-9}}
    
  211. X. Pan
    Digital Image Forensics with Statistical Analysis
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Pan2015,
     author = {Pan, Xunyu},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  212. R.C. Pandey, R. Agrawal, S.K. Singh & K.K. Shukla
    Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features
    Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
    Springer, 2015
    DOI: 10.1007/978-3-319-11933-5_74
    BibTeX
    @incollection{Pandey2015,
     author = {Pandey, Ramesh Chand and Agrawal, Rishabh and Singh, Sanjay Kumar and Shukla, K. K.},
     title = {Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features},
     booktitle = {Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014},
     publisher = {Springer},
     year = {2015}}
    
  213. Peng
    Towards an Image Blurring Detection Approach Based on Color Filter Array
    Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)
    2015
    DOI: 10.2991/meic-15.2015.55
    BibTeX
    @inproceedings{Peng2015,
     author = {Peng},
     title = {Towards an Image Blurring Detection Approach Based on Color Filter Array},
     booktitle = {Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)},
     year = {2015}}
    
  214. A. Peng, H. Zeng, X. Lin & X. Kang
    Countering Anti-forensics of Image Resampling
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 3595-3599
    DOI: 10.1109/ICIP.2015.7351474
    BibTeX
    @inproceedings{Peng2015b,
     author = {Peng, Anjie and Zeng, Hui and Lin, Xiaodan and Kang, Xiangui},
     title = {Countering Anti-forensics of Image Resampling},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {3595--3599}}
    
  215. A. Peng, H. Zeng, X. Lin & X. Kang
    Countering anti-forensics of image resampling
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2015, pp. 3595-3599
    DOI: 10.1109/ICIP.2015.7351474
    BibTeX
    @inproceedings{Peng2015e,
     author = {Peng, A. and Zeng, H. and Lin, X. and Kang, X.},
     title = {Countering anti-forensics of image resampling},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2015},
     pages = {3595--3599}}
    
  216. B. Peng, W. Wang, J. Dong & T. Tan
    Detection of Computer Generated Faces in Videos Based on Pulse Signal
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 841-845
    DOI: 10.1109/ChinaSIP.2015.7230523
    BibTeX
    @inproceedings{Peng2015a,
     author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Detection of Computer Generated Faces in Videos Based on Pulse Signal},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {841--845}}
    
  217. B. Peng, W. Wang, J. Dong & T. Tan
    Improved 3D Lighting Environment Estimation for Image Forgery Detection
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368587
    BibTeX
    @inproceedings{Peng2015d,
     author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Improved 3D Lighting Environment Estimation for Image Forgery Detection},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  218. F. Peng, Y. Zhu & M. Long
    Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU
    Algorithms and Architectures for Parallel Processing, Springer, 2015
    DOI: 10.1007/978-3-319-27122-4_15
    BibTeX
    @article{Peng2015c,
     author = {Peng, Fei and Zhu, Yin and Long, Min},
     title = {Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU},
     journal = {Algorithms and Architectures for Parallel Processing},
     publisher = {Springer},
     year = {2015}}
    
  219. F. Perez-Gonzalez, I. Gonzalez-Iglesias, M. Masciopinto & P. Comesana
    Fast Sequential Forensic Camera Identification
    arxiv, 2015
    BibTeX
    @article{Perez-Gonzalez2015,
     author = {Perez-Gonzalez, F. and Gonzalez-Iglesias, I. and Masciopinto, M. and Comesana, P.},
     title = {Fast Sequential Forensic Camera Identification},
     journal = {arxiv},
     year = {2015}}
    
  220. S. Pittala, E. Whiting & H. Farid
    A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo
    JDFSL, 2015, Vol. 10(3), pp. 87-98
    BibTeX
    @article{Pittala2015,
     author = {Pittala, Srivamshi and Whiting, Emily and Farid, Hany},
     title = {A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo},
     journal = {JDFSL},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {87--98}}
    
  221. S. Pollard, G. Adams & S. Simske
    Forensic Identification of Printed Documents
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 442-479
    DOI: 10.1002/9781118705773.ch12
    BibTeX
    @incollection{Pollard2015,
     author = {Pollard, Stephen and Adams, Guy and Simske, Steven},
     title = {Forensic Identification of Printed Documents},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {442--479}}
    
  222. D. Prakash, P. Kalwad, V. Peddigari & P. Srinivasa
    Automatic Reflection Removal Using Reflective Layer Image Information
    Consumer Electronics (ICCE), 2015 IEEE International Conference on
    2015, pp. 548-551
    DOI: 10.1109/ICCE.2015.7066520
    BibTeX
    @inproceedings{Prakash2015,
     author = {Prakash, Divya and Kalwad, Pramati and Peddigari, Venkat and Srinivasa, Phanish},
     title = {Automatic Reflection Removal Using Reflective Layer Image Information},
     booktitle = {Consumer Electronics (ICCE), 2015 IEEE International Conference on},
     year = {2015},
     pages = {548--551}}
    
  223. S.V. Priyan & S.K. Srivatsa
    Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis
    Indian Journal of Science and Technology, 2015, Vol. 8(28)
    DOI: 10.17485/ijst/2015/v8i28/70923
    BibTeX
    @article{Priyan2015,
     author = {Priyan, S. Vishnu and Srivatsa, S. K.},
     title = {Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {28}}
    
  224. C.-M. Pun, X.-C. Yuan & X.-L. Bi
    Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching
    Information Forensics and Security, IEEE Transactions on, 2015(99)
    DOI: 10.1109/TIFS.2015.2423261
    BibTeX
    @article{Pun2015,
     author = {Pun, Chi-Man and Yuan, Xiao-Chen and Bi, Xiu-Li},
     title = {Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     number = {99}}
    
  225. E.P. Purwandari
    Image Splicing Detection Based on Demosaicking and Wavelet Transformation
    Jurnal Ilmu Komputer dan Informasi, 2015
    BibTeX
    @article{Purwandari2015,
     author = {Purwandari, Endina Putri},
     title = {Image Splicing Detection Based on Demosaicking and Wavelet Transformation},
     journal = {Jurnal Ilmu Komputer dan Informasi},
     year = {2015}}
    
  226. T. Qiao, F. Retraint, R. Cogranne & T.H. Thai
    Source Camera Device Identification Based on Raw Images
    2015
    DOI: 10.1109/icip.2015.7351518
    BibTeX
    @electronic{Qiao2015,
     author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai},
     title = {Source Camera Device Identification Based on Raw Images},
     year = {2015}}
    
  227. E. Quiring & M. Kirchner
    Fragile Sensor Fingerprint Camera Identification
    Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)
    2015
    DOI: 10.1109/wifs.2015.7368580
    BibTeX
    @inproceedings{Quiring2015,
     author = {Quiring, Erwin and Kirchner, Matthias},
     title = {Fragile Sensor Fingerprint Camera Identification},
     booktitle = {Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)},
     year = {2015}}
    
  228. M.A. Qureshi & M. Deriche
    A Bibliography of Pixel-based Blind Image Forgery Detection Techniques
    Signal Processing: Image Communication, 2015, Vol. 39, Part A, pp. 46-74
    DOI: 10.1016/j.image.2015.08.008
    BibTeX
    @article{Qureshi2015,
     author = {Qureshi, Muhammad Ali and Deriche, Mohamed},
     title = {A Bibliography of Pixel-based Blind Image Forgery Detection Techniques},
     journal = {Signal Processing: Image Communication},
     year = {2015},
     volume = {39, Part A},
     pages = {46--74}}
    
  229. R.M. Rad & K. Wong
    Digital Image Forgery Detection by Edge Analysis
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 19-20
    DOI: 10.1109/ICCE-TW.2015.7216848
    BibTeX
    @inproceedings{Rad2015,
     author = {Rad, R. M. and Wong, Koksheik},
     title = {Digital Image Forgery Detection by Edge Analysis},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {19--20}}
    
  230. R. Rajkumar & K.M. Singh
    Digital Image Forgery Detection Using SIFT Feature
    Proc. Int Advanced Computing and Communication (ISACC) Symp
    2015, pp. 186-191
    DOI: 10.1109/ISACC.2015.7377340
    BibTeX
    @inproceedings{Rajkumar2015,
     author = {Rajkumar, R. and Singh, K. M.},
     title = {Digital Image Forgery Detection Using SIFT Feature},
     booktitle = {Proc. Int Advanced Computing and Communication (ISACC) Symp},
     year = {2015},
     pages = {186--191}}
    
  231. H. Ravi, A.V. Subramanyam & S. Emmanuel
    Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise
    2015 IEEE International Conference on Image Processing (ICIP)
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/icip.2015.7350986
    BibTeX
    @inproceedings{Ravi2015,
     author = {Ravi, Hareesh and Subramanyam, A. V. and Emmanuel, Sabu},
     title = {Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise},
     booktitle = {2015 IEEE International Conference on Image Processing (ICIP)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  232. R.S. Remya & A.B. Beevi
    Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise
    Proc. IEEE Int Engineering and Technology (ICETECH) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICETECH.2015.7274998
    BibTeX
    @inproceedings{Remya2015,
     author = {Remya, R. S. and Beevi, A. B.},
     title = {Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise},
     booktitle = {Proc. IEEE Int Engineering and Technology (ICETECH) Conf},
     year = {2015},
     pages = {1--5}}
    
  233. P.D. Reshma & C. Arunvinodh
    Image Forgery Detection Using SVM Classifier
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICIIECS.2015.7193202
    BibTeX
    @inproceedings{Reshma2015,
     author = {Reshma, P. D. and Arunvinodh, C.},
     title = {Image Forgery Detection Using SVM Classifier},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--5}}
    
  234. K.H. Rhee
    Median Filtering Detection Using Latent Growth Modeling
    Journal of the Institute of Electrolnic Engineers of Korea, 2015(1), pp. 61-68
    BibTeX
    @article{Rhee2015,
     author = {Rhee, Kang Hyeon},
     title = {Median Filtering Detection Using Latent Growth Modeling},
     journal = {Journal of the Institute of Electrolnic Engineers of Korea},
     year = {2015},
     number = {1},
     pages = {61--68}}
    
  235. K.H. Rhee
    Median Filtering Detection of Digital Images Using Pixel Gradients
    IEIE Transactions on Smart Processing & Computing, 2015, Vol. 4(4), pp. 195-201
    DOI: 10.5573/ieiespc.2015.4.4.195
    BibTeX
    @article{Rhee2015a,
     author = {Rhee, Kang Hyeon},
     title = {Median Filtering Detection of Digital Images Using Pixel Gradients},
     journal = {IEIE Transactions on Smart Processing & Computing},
     year = {2015},
     volume = {4},
     number = {4},
     pages = {195--201}}
    
  236. C. Riess, S. Pfaller & E. Angelopoulou
    Reflectance Normalization in Illumination-based Image Manipulation Detection
    New Trends in Image Analysis and Processing, 2015
    BibTeX
    @article{Riess2015,
     author = {Riess, Christian and Pfaller, Sven and Angelopoulou, Elli},
     title = {Reflectance Normalization in Illumination-based Image Manipulation Detection},
     journal = {New Trends in Image Analysis and Processing},
     year = {2015}}
    
  237. S. Rocchi, R. Simlinger, M. Moeslinger, J. Murray, G. Hadfi & M. John
    Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance
    Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014
    2015, pp. 491
    BibTeX
    @inproceedings{Rocchi2015,
     author = {Rocchi, S. and Simlinger, R. and Moeslinger, M. and Murray, J. and Hadfi, G. and John, M.},
     title = {Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance},
     booktitle = {Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014},
     year = {2015},
     pages = {491}}
    
  238. F. Rodríguez-Santos, G. Delgado-Gutierréz, L. Palacios-Luengas & R. Vazquéz-Medina
    Practical implementation of a methodology for digital images authentication using forensics techniques
    CSIJ Advances in Computer Science: an International Journal, 2015, Vol. 4(18)
    BibTeX
    @article{Rodriguez-Santos2015,
     author = {Rodríguez-Santos, Francisco and Delgado-Gutierréz, Guillermo and Palacios-Luengas, Leonardo and Vazquéz-Medina, Rubén},
     title = {Practical implementation of a methodology for digital images authentication using forensics techniques},
     journal = {CSIJ Advances in Computer Science: an International Journal},
     year = {2015},
     volume = {4},
     number = {18}}
    
  239. C. Ruiz, S. Arroyo, I. Krsteski, P. Dago, J. Sanchez, L. Perez-Freire, A. De Rosa, M. Fontani, A. Costanzo, A. Piva, D. Ariu, L. Piras, R. Ahumada & M. Jerian
    The MAVEN Project: Management and Authenticity Verification of Multimedia Contents
    Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-4
    DOI: 10.1109/icmew.2015.7169825
    BibTeX
    @inproceedings{Ruiz2015,
     author = {Ruiz, C. and Arroyo, S. and Krsteski, I. and Dago, P. and Sanchez, J. and Perez-Freire, L. and De Rosa, A. and Fontani, M. and Costanzo, A. and Piva, A. and Ariu, D. and Piras, L. and Ahumada, R. and Jerian, M.},
     title = {The MAVEN Project: Management and Authenticity Verification of Multimedia Contents},
     booktitle = {Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--4}}
    
  240. K. Saini & I. p.C. m. d.A. o. d. Shabnampreet Kaur, Forensic document examination
    Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques
    Egyptian Journal of Forensic Sciences, 2015(0), pp. -
    DOI: 10.1016/j.ejfs.2015.03.001
    BibTeX
    @article{Saini2015,
     author = {Saini, Komal and Shabnampreet Kaur, Forensic document examination, Image processing Computer manipulated documents Alterations of documents},
     title = {Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques},
     journal = {Egyptian Journal of Forensic Sciences},
     year = {2015},
     number = {0},
     pages = {-}}
    
  241. V.K. Sanap & V.M. Mane
    Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 599-604
    DOI: 10.1109/ICATCCT.2015.7456955
    BibTeX
    @inproceedings{Sanap2015,
     author = {Sanap, V. K. and Mane, V. M.},
     title = {Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {599--604}}
    
  242. P. Sanas & P. Gupta
    Image Recapture Discovery Algorithms: A Survey
    IJSR, International Journal of Science and Research, 2015, Vol. 4(11), pp. 926-929
    DOI: 10.21275/v4i11.nov151302
    BibTeX
    @article{Sanas2015,
     author = {Sanas, P. and Gupta, P.},
     title = {Image Recapture Discovery Algorithms: A Survey},
     journal = {IJSR},
     publisher = {International Journal of Science and Research},
     year = {2015},
     volume = {4},
     number = {11},
     pages = {926--929}}
    
  243. A. Sandoval Orozco, J. Corripio, L. García Villalba & J. Hernández Castro
    Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
    Multimedia Tools and Applications, Springer US, 2015, pp. 1-25
    DOI: 10.1007/s11042-015-2633-2
    BibTeX
    @article{SandovalOrozco2015,
     author = {Sandoval Orozco, AnaLucila and Corripio, JocelinRosales and García Villalba, LuisJavier and Hernández Castro, JulioCésar},
     title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2015},
     pages = {1--25}}
    
  244. A.L. Sandoval Orozco, D.M. Arenas González, L.J. García Villalba & J. Hernández-Castro
    Analysis of Errors in EXIF Metadata on Mobile Devices
    Multimedia Tools and Applications, Springer, 2015, Vol. 74(13), pp. 4735
    DOI: 10.1007/s11042-013-1837-6
    BibTeX
    @article{SandovalOrozco2015a,
     author = {Sandoval Orozco, Ana Lucila and Arenas González, David Manuel and García Villalba, Luis Javier and Hernández-Castro, Julio},
     title = {Analysis of Errors in EXIF Metadata on Mobile Devices},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     volume = {74},
     number = {13},
     pages = {4735}}
    
  245. J. Satiro, K. Nasrollahi, P.L. Correia & T.B. Moeslund
    Super-resolution of facial images in forensics scenarios
    Proc. Tools and Applications (IPTA) 2015 Int. Conf. Image Processing Theory
    2015, pp. 55-60
    DOI: 10.1109/IPTA.2015.7367096
    BibTeX
    @inproceedings{Satiro2015,
     author = {Satiro, J. and Nasrollahi, K. and Correia, P. L. and Moeslund, T. B.},
     title = {Super-resolution of facial images in forensics scenarios},
     booktitle = {Proc. Tools and Applications (IPTA) 2015 Int. Conf. Image Processing Theory},
     year = {2015},
     pages = {55--60}}
    
  246. R. Satta
    Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification
    electronic, 2015
    BibTeX
    @misc{Satta2015,
     author = {Satta, Riccardo},
     title = {Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification},
     year = {2015}}
    
  247. R. Satta & A. Ciardulli
    Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking
    IET Comput Vision, 2015, Vol. 9(5), pp. 711-722
    DOI: 10.1049/iet-cvi.2014.0320
    BibTeX
    @article{Satta2015a,
     author = {Satta, R. and Ciardulli, A.},
     title = {Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking},
     journal = {IET Comput Vision},
     year = {2015},
     volume = {9},
     number = {5},
     pages = {711--722}}
    
  248. S. Saxena
    Video Inpainting Detection Using Inconsistencies in Optical Flow
    Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, 2015
    BibTeX
    @mastersthesis{Saxena2015,
     author = {Saxena, Shobhita},
     title = {Video Inpainting Detection Using Inconsistencies in Optical Flow},
     school = {Indraprastha Institute of Information Technology, Delhi (IIIT-D), India},
     year = {2015}}
    
  249. V. Schetinger & T.J.C. MM Oliveira, R da Silva
    Humans Are Easily Fooled by Digital Images
    arxiv, 2015
    BibTeX
    @article{Schetinger2015,
     author = {Schetinger, Victor and MM Oliveira, R da Silva, T. J. Carvalho},
     title = {Humans Are Easily Fooled by Digital Images},
     journal = {arxiv},
     year = {2015}}
    
  250. J. Schindelin, C.T. Rueden, M.C. Hiner & K.W. Eliceiri
    The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.
    Mol Reprod Dev, Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., 2015, Vol. 82(7-8), pp. 518-529
    DOI: 10.1002/mrd.22489
    BibTeX
    @article{Schindelin2015,
     author = {Schindelin, Johannes and Rueden, Curtis T. and Hiner, Mark C. and Eliceiri, Kevin W.},
     title = {The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.},
     journal = {Mol Reprod Dev},
     school = {Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin.},
     year = {2015},
     volume = {82},
     number = {7-8},
     pages = {518--529}}
    
  251. R. Sekhar & R.S. Shaji
    A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
    Proceedings of the International Conference on Soft Computing Systems
    Springer Science mathplus Business Media, 2015, pp. 223-233
    DOI: 10.1007/978-81-322-2674-1_23
    BibTeX
    @incollection{Sekhar2015,
     author = {Sekhar, Resmi and Shaji, R. S.},
     title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor},
     booktitle = {Proceedings of the International Conference on Soft Computing Systems},
     publisher = {Springer Science mathplus Business Media},
     year = {2015},
     pages = {223--233}}
    
  252. M. Shandilya, R. Naskar & R. Dixit
    Detection of Geometric Transformations in Copy-move Forgery of Digital Images
    Proc. Annual IEEE India Conf. (INDICON)
    2015, pp. 1-6
    DOI: 10.1109/INDICON.2015.7443141
    BibTeX
    @inproceedings{Shandilya2015,
     author = {Shandilya, M. and Naskar, R. and Dixit, R.},
     title = {Detection of Geometric Transformations in Copy-move Forgery of Digital Images},
     booktitle = {Proc. Annual IEEE India Conf. (INDICON)},
     year = {2015},
     pages = {1--6}}
    
  253. S. Shang & X. Kong
    Printer and Scanner Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 10
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch10
    BibTeX
    @inbook{Shang2015,
     author = {Shang, Shize and Kong, Xiangwei},
     title = {Printer and Scanner Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  254. A. Sharma & P. Singh
    A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection
    Proc. TENCON 2015 - 2015 IEEE Region 10 Conf
    2015, pp. 1-4
    DOI: 10.1109/TENCON.2015.7372903
    BibTeX
    @inproceedings{Sharma2015a,
     author = {Sharma, A. and Singh, P.},
     title = {A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection},
     booktitle = {Proc. TENCON 2015 - 2015 IEEE Region 10 Conf},
     year = {2015},
     pages = {1--4}}
    
  255. S. Sharma & U. Ghanekar
    A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images
    Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
    2015, pp. 795-798
    DOI: 10.1109/CICT.2015.88
    BibTeX
    @inproceedings{Sharma2015,
     author = {Sharma, Surbhi and Ghanekar, Umesh},
     title = {A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images},
     booktitle = {Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on},
     year = {2015},
     pages = {795--798}}
    
  256. Z. Shi, X. Shen, H. Chen & X. Li
    Blind Detection of Image Splicing Based on Fuzzy Run-length
    Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf
    2015, pp. 915-920
    DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.137
    BibTeX
    @inproceedings{Shi2015,
     author = {Shi, Z. and Shen, X. and Chen, H. and Li, X.},
     title = {Blind Detection of Image Splicing Based on Fuzzy Run-length},
     booktitle = {Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf},
     year = {2015},
     pages = {915--920}}
    
  257. F.Y. Shih & J.K. Jackson
    Copy-cover Image Forgery Detection in Parallel Processing
    Int. J. Patt. Recogn. Artif. Intell., 2015
    BibTeX
    @article{Shih2015a,
     author = {Shih, Frank Y. and Jackson, Jason K.},
     title = {Copy-cover Image Forgery Detection in Parallel Processing},
     journal = {Int. J. Patt. Recogn. Artif. Intell.},
     year = {2015}}
    
  258. Y. Shih, D. Krishnan, F. Durand & W.T. Freeman
    Reflection Removal Using Ghosting Cues
    Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
    The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
    BibTeX
    @inproceedings{Shih2015,
     author = {Shih, YiChang and Krishnan, Dilip and Durand, Fredo and Freeman, William T.},
     title = {Reflection Removal Using Ghosting Cues},
     booktitle = {Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015},
     journal = {The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)},
     year = {2015}}
    
  259. M.V.K. Shingote & A. Kumar
    Survey on Recapture Detection Algorithms
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(12)
    BibTeX
    @article{Shingote2015a,
     author = {Shingote, Mr Vinayak K. and Kumar, Ashish},
     title = {Survey on Recapture Detection Algorithms},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {12}}
    
  260. V.K. Shingote & R. Kabara
    Image Authentication by Detecting Demosaicing
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(5), pp. 256-259
    BibTeX
    @article{Shingote2015,
     author = {Shingote, Vinayak K. and Kabara, Ruhi},
     title = {Image Authentication by Detecting Demosaicing},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {5},
     pages = {256--259}}
    
  261. E. Silva, T. Carvalho, A. Ferreira & A. Rocha
    Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes
    Journal of Visual Communication and Image Representation, Elsevier BV, 2015, Vol. 29(0), pp. 16-32
    DOI: 10.1016/j.jvcir.2015.01.016
    BibTeX
    @article{Silva2015,
     author = {Silva, Ewerton and Carvalho, Tiago and Ferreira, Anselmo and Rocha, Anderson},
     title = {Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {29},
     number = {0},
     pages = {16--32}}
    
  262. N. Singh & R. Bansal
    Analysis of Benford´s Law in Digital Image Forensics
    Proc. Int Signal Processing and Communication (ICSC) Conf
    2015, pp. 413-418
    DOI: 10.1109/ICSPCom.2015.7150688
    BibTeX
    @inproceedings{Singh2015b,
     author = {Singh, N. and Bansal, R.},
     title = {Analysis of Benford´s Law in Digital Image Forensics},
     booktitle = {Proc. Int Signal Processing and Communication (ICSC) Conf},
     year = {2015},
     pages = {413--418}}
    
  263. N. Singh & R. Bansal
    Analysis of Benford's law in digital image forensics
    Proc. Int. Conf. Signal Processing and Communication (ICSC)
    2015, pp. 413-418
    DOI: 10.1109/ICSPCom.2015.7150688
    BibTeX
    @inproceedings{Singh2015c,
     author = {Singh, N. and Bansal, R.},
     title = {Analysis of Benford's law in digital image forensics},
     booktitle = {Proc. Int. Conf. Signal Processing and Communication (ICSC)},
     year = {2015},
     pages = {413--418}}
    
  264. V. Singh, P. Pant & R. Tripathi
    Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features
    James, J. & Breitinger, F. (ed.)
    Digital Forensics and Cyber Crime
    Springer International Publishing, 2015, Vol. 157, pp. 29-38
    DOI: 10.1007/978-3-319-25512-5_3
    BibTeX
    @incollection{Singh2015,
     author = {Singh, VivekKumar and Pant, Pallav and Tripathi, RameshChandra},
     title = {Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features},
     booktitle = {Digital Forensics and Cyber Crime},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {157},
     pages = {29--38}}
    
  265. V.K. Singh & R.C. Tripathi
    Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images
    Procedia Computer Science, 2015, Vol. 54, pp. 772-780
    DOI: 10.1016/j.procs.2015.06.091
    BibTeX
    @article{Singh2015a,
     author = {Singh, Vivek Kumar and Tripathi, R. C.},
     title = {Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {54},
     pages = {772--780}}
    
  266. J.J. Sonu, G. Krishnalal & R.V.P. Jagathy
    Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement
    International Journal of Computer Applications, 2015
    BibTeX
    @article{Sonu2015,
     author = {Sonu, John Jacob and Krishnalal, G. and Jagathy, Raj V. P.},
     title = {Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement},
     journal = {International Journal of Computer Applications},
     year = {2015}}
    
  267. A.R. Soobhany, K.P. Lam, P. Fletcher & D.J. Collins
    Mobile Camera Source Identification with SVD
    Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering
    Springer, 2015
    DOI: 10.1007/978-3-319-06773-5_18
    BibTeX
    @incollection{Soobhany2015,
     author = {Soobhany, A. R. and Lam, K. P. and Fletcher, P. and Collins, D. J.},
     title = {Mobile Camera Source Identification with SVD},
     booktitle = {Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering},
     publisher = {Springer},
     year = {2015}}
    
  268. S.T.S. Sornalatha, S.D. Mahalakshmi & K. Vijayalakshmi
    Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach
    Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf
    2015, pp. 1162-1167
    DOI: 10.1109/ECS.2015.7124767
    BibTeX
    @inproceedings{Sornalatha2015,
     author = {Sornalatha, S. T. S. and Mahalakshmi, S. D. and Vijayalakshmi, K.},
     title = {Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach},
     booktitle = {Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf},
     year = {2015},
     pages = {1162--1167}}
    
  269. J. Spangenberg
    Soziale Medien Und Journalistische Berichterstattung
    Digitale Politikvermittlung, Springer, 2015
    DOI: 10.1007/978-3-658-06571-3_8
    BibTeX
    @article{Spangenberg2015,
     author = {Spangenberg, Jochen},
     title = {Soziale Medien Und Journalistische Berichterstattung},
     journal = {Digitale Politikvermittlung},
     publisher = {Springer},
     year = {2015}}
    
  270. M. Steinebach, Y. Yannikos, S. Zmudzinski & C. Winter
    Advanced Multimedia File Carving
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 219-269
    DOI: 10.1002/9781118705773.ch6
    BibTeX
    @incollection{Steinebach2015,
     author = {Steinebach, Martin and Yannikos, York and Zmudzinski, Sascha and Winter, Christian},
     title = {Advanced Multimedia File Carving},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {219--269}}
    
  271. P.-C. Su, P.-L. Suei, M.-K. Chang & J. Lain
    Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC
    Journal of Visual Communication and Image Representation, 2015(0), pp. -
    DOI: 10.1016/j.jvcir.2015.02.006
    BibTeX
    @article{Su2015,
     author = {Su, Po-Chyi and Suei, Pei-Lun and Chang, Min-Kuan and Lain, Jie},
     title = {Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     number = {0},
     pages = {-}}
    
  272. X. Sun, Y. Li, S. Niu & Y. Huang
    The Detecting System of Image Forgeries with Noise Features and EXIF Information
    Journal of Systems Science and Complexity, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, 2015, Vol. 28(5), pp. 1164-1176
    DOI: 10.1007/s11424-015-4023-2
    BibTeX
    @article{Sun2015,
     author = {Sun, Xiaoting and Li, Yezhou and Niu, Shaozhang and Huang, Yanli},
     title = {The Detecting System of Image Forgeries with Noise Features and EXIF Information},
     journal = {Journal of Systems Science and Complexity},
     publisher = {Academy of Mathematics and Systems Science, Chinese Academy of Sciences},
     year = {2015},
     volume = {28},
     number = {5},
     pages = {1164--1176}}
    
  273. F. Sur & M. Grédiac
    Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering
    SIAM Journal on Imaging Sciences, 2015, Vol. 8(1), pp. 611-643
    DOI: 10.1137/140977035
    BibTeX
    @article{Sur2015,
     author = {Sur, Frédéric and Grédiac, Michel},
     title = {Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering},
     journal = {SIAM Journal on Imaging Sciences},
     year = {2015},
     volume = {8},
     number = {1},
     pages = {611--643}}
    
  274. A. Sutardja, O. Ramadan & Y. Zhao
    Forensic Methods for Detecting Image Manipulation - Copy Move
    Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
    BibTeX
    @techreport{Sutardja2015,
     author = {Sutardja, Anthony and Ramadan, Omar and Zhao, Yan},
     title = {Forensic Methods for Detecting Image Manipulation - Copy Move},
     school = {Electrical Engineering and Computer Sciences University of California at Berkeley},
     year = {2015}}
    
  275. A. Sutardja & Y. Zhao
    Digital Image Manipulation Forensics
    Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
    BibTeX
    @techreport{Sutardja2015a,
     author = {Sutardja, Anthony and Zhao, Yan},
     title = {Digital Image Manipulation Forensics},
     school = {Electrical Engineering and Computer Sciences University of California at Berkeley},
     year = {2015}}
    
  276. A. Taimori, F. Razzazi, A. Behrad, A. Ahmadi & M. Babaie-Zadeh
    Quantization-unaware Double JPEG Compression Detection
    Journal of Mathematical Imaging and Vision, Springer US, 2015, pp. 1-18
    DOI: 10.1007/s10851-015-0602-z
    BibTeX
    @article{Taimori2015,
     author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud},
     title = {Quantization-unaware Double JPEG Compression Detection},
     journal = {Journal of Mathematical Imaging and Vision},
     publisher = {Springer US},
     year = {2015},
     pages = {1--18}}
    
  277. Y. Tan, B. Wang, M. Zhao, X. Kong & M. Li
    Patch-based Sensor Pattern Noise for Camera Source Identification
    School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, 2015
    DOI: 10.1109/chinasip.2015.7230528
    BibTeX
    @techreport{Tan2015,
     author = {Tan, Yue and Wang, Bo and Zhao, Meijuan and Kong, Xiangwei and Li, Ming},
     title = {Patch-based Sensor Pattern Noise for Camera Source Identification},
     school = {School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China},
     year = {2015}}
    
  278. K.A. Tatkare & V. Mane
    Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 409-414
    DOI: 10.1109/ICATCCT.2015.7456918
    BibTeX
    @inproceedings{Tatkare2015,
     author = {Tatkare, K. A. and Mane, V.},
     title = {Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {409--414}}
    
  279. S. Teerakanok & U. Tetsutaro
    Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes
    Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)
    2015, Vol. 3, pp. 35-39
    DOI: 10.1109/COMPSAC.2015.167
    BibTeX
    @inproceedings{Teerakanok2015,
     author = {Teerakanok, S. and Tetsutaro, U.},
     title = {Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes},
     booktitle = {Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)},
     year = {2015},
     volume = {3},
     pages = {35--39}}
    
  280. T.H. Thai, F. Retraint & R. Cogranne
    Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images
    Signal Processing, 2015(0), pp. -
    DOI: 10.1016/j.sigpro.2015.02.020
    BibTeX
    @article{Thai2015,
     author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi},
     title = {Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images},
     journal = {Signal Processing},
     year = {2015},
     number = {0},
     pages = {-}}
    
  281. T.H. Thai, F. Retraint & R. Cogranne
    Camera Model Identification Based on DCT\ Coefficient Statistics
    Digital Signal Processing, 2015(0), pp. -
    DOI: 10.1016/j.dsp.2015.01.002
    BibTeX
    @article{Thai2015a,
     author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi},
     title = {Camera Model Identification Based on DCT\ Coefficient Statistics},
     journal = {Digital Signal Processing},
     year = {2015},
     number = {0},
     pages = {-}}
    
  282. T. Thongkamwitoon, H. Muammar & P.L. Dragotti
    An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(5), pp. 953-968
    DOI: 10.1109/TIFS.2015.2392566
    BibTeX
    @article{Thongkamwitoon2015,
     author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.},
     title = {An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {5},
     pages = {953--968}}
    
  283. N. Tiwari, D. Dubey & A. Goyal
    Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing
    Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf
    2015, pp. 564-567
    DOI: 10.1109/CSNT.2015.286
    BibTeX
    @inproceedings{Tiwari2015,
     author = {Tiwari, N. and Dubey, D. and Goyal, A.},
     title = {Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing},
     booktitle = {Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf},
     year = {2015},
     pages = {564--567}}
    
  284. D. Tralic, S. Grgic, X. Sun & P.L. Rosin
    Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-2961-2
    BibTeX
    @article{Tralic2015,
     author = {Tralic, Dijana and Grgic, Sonja and Sun, Xianfang and Rosin, Paul L.},
     title = {Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  285. A. Tuama, F. Comby & M. Chaumont
    Source Camera Model Identification Using Features from Contaminated Sensor Noise
    The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015, 2015
    BibTeX
    @article{Tuama2015,
     author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc},
     title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise},
     journal = {The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015},
     year = {2015}}
    
  286. S. Turk, O. Bingol & G. Ulutas
    Detection of Copy-move Forgery Using Dogcode
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 2366-2369
    DOI: 10.1109/SIU.2015.7130356
    BibTeX
    @inproceedings{Turk2015,
     author = {Turk, Salih and Bingol, Ozkan and Ulutas, Guzin},
     title = {Detection of Copy-move Forgery Using Dogcode},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {2366--2369}}
    
  287. D.M. Uliyan, H.A. Jalab & A.W.A. Wahab
    Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern
    Proc. IEEE Confernece Open Systems (ICOS)
    2015, pp. 7-11
    DOI: 10.1109/ICOS.2015.7377269
    BibTeX
    @inproceedings{Uliyan2015,
     author = {Uliyan, D. M. and Jalab, H. A. and Wahab, A. W. A.},
     title = {Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern},
     booktitle = {Proc. IEEE Confernece Open Systems (ICOS)},
     year = {2015},
     pages = {7--11}}
    
  288. B. Ustubioglu, S. Ayas, H. Dogan & G. Ulutas
    Image Forgery Detection Based on Colour SIFT
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 1741-1744
    DOI: 10.1109/SIU.2015.7130189
    BibTeX
    @inproceedings{Ustubioglu2015,
     author = {Ustubioglu, Beste and Ayas, Selen and Dogan, Hulya and Ulutas, Guzin},
     title = {Image Forgery Detection Based on Colour SIFT},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {1741--1744}}
    
  289. B. Ustubioglu, G. Muzaffer, G. Ulutas, V. Nabiyev & M. Ulutas
    A novel keypoint based forgery detection method based on local phase quantization and SIFT
    Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
    2015, pp. 185-189
    DOI: 10.1109/ELECO.2015.7394438
    BibTeX
    @inproceedings{Ustubioglu2015c,
     author = {Ustubioglu, B. and Muzaffer, G. and Ulutas, G. and Nabiyev, V. and Ulutas, M.},
     title = {A novel keypoint based forgery detection method based on local phase quantization and SIFT},
     booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)},
     year = {2015},
     pages = {185--189}}
    
  290. B. Ustubioglu, V. Nabiyev, G. Ulutas & M. Ulutas
    Image Forgery Detection Using Colour Moments
    Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf
    2015, pp. 540-544
    DOI: 10.1109/TSP.2015.7296321
    BibTeX
    @inproceedings{Ustubioglu2015b,
     author = {Ustubioglu, B. and Nabiyev, V. and Ulutas, G. and Ulutas, M.},
     title = {Image Forgery Detection Using Colour Moments},
     booktitle = {Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf},
     year = {2015},
     pages = {540--544}}
    
  291. B. Ustubioglu, G. Ulutas, V. Nabiyev & M. Ulutas
    Image Forgery Detection Based on Energy Probability
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 919-922
    DOI: 10.1109/SIU.2015.7129980
    BibTeX
    @inproceedings{Ustubioglu2015a,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Nabiyev, Vasif and Ulutas, Mustafa},
     title = {Image Forgery Detection Based on Energy Probability},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {919--922}}
    
  292. G. Valenzise, S. Tubaro & M. Tagliasacchi
    Anti-Forensics of Multimedia Data and Countermeasures
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 612-651
    DOI: 10.1002/9781118705773.ch16
    BibTeX
    @incollection{Valenzise2015,
     author = {Valenzise, Giuseppe and Tubaro, Stefano and Tagliasacchi, Marco},
     title = {Anti-Forensics of Multimedia Data and Countermeasures},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {612--651}}
    
  293. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Compressed Fingerprint Matching and Camera Identification Via Random Projections
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(7), pp. 1472-1485
    DOI: 10.1109/TIFS.2015.2415461
    BibTeX
    @article{Valsesia2015,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Compressed Fingerprint Matching and Camera Identification Via Random Projections},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {7},
     pages = {1472--1485}}
    
  294. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Image Retrieval Based on Compressed Camera Sensor Fingerprints
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICME.2015.7177454
    BibTeX
    @inproceedings{Valsesia2015a,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Image Retrieval Based on Compressed Camera Sensor Fingerprints},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2015},
     pages = {1--6}}
    
  295. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Large-scale Image Retrieval Based on Compressed Camera Identification
    IEEE Transactions on Multimedia, 2015, Vol. 17(9), pp. 1439-1449
    DOI: 10.1109/TMM.2015.2455417
    BibTeX
    @article{Valsesia2015b,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Large-scale Image Retrieval Based on Compressed Camera Identification},
     journal = {IEEE Transactions on Multimedia},
     year = {2015},
     volume = {17},
     number = {9},
     pages = {1439--1449}}
    
  296. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Scale-robust Compressive Camera Fingerprint Matching with Random Projections
    Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
    2015, pp. 1697-1701
    DOI: 10.1109/ICASSP.2015.7178260
    BibTeX
    @inproceedings{Valsesia2015c,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Scale-robust Compressive Camera Fingerprint Matching with Random Projections},
     booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf},
     year = {2015},
     pages = {1697--1701}}
    
  297. D. Vázquez-Padín
    Detection of Image Resampling and Video Encoding Footprints for Forensic Applications
    University of Vigo, Universida de Vigo, 2015
    BibTeX
    @phdthesis{Vazquez-Padin2015a,
     author = {Vázquez-Padín, David},
     title = {Detection of Image Resampling and Video Encoding Footprints for Forensic Applications},
     school = {University of Vigo},
     year = {2015}}
    
  298. D. Vazquez-Padın, P. Comesana & F. Perez-Gonzalez
    An SVD Approach to Forensic Image Resampling Detection
    Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)
    Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008), 2015
    DOI: 10.1109/eusipco.2015.7362748
    BibTeX
    @inproceedings{Vazquez-Padin2015,
     author = {Vazquez-Padın, David and Comesana, Pedro and Perez-Gonzalez, Fernando},
     title = {An SVD Approach to Forensic Image Resampling Detection},
     booktitle = {Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)},
     journal = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)},
     year = {2015}}
    
  299. D.S. Vidyadharan & S.M. Thampi
    Brightness Distribution Based Image Tampering Detection
    Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on
    2015, pp. 1-5
    DOI: 10.1109/SPICES.2015.7091555
    BibTeX
    @inproceedings{Vidyadharan2015,
     author = {Vidyadharan, D. S. and Thampi, S. M.},
     title = {Brightness Distribution Based Image Tampering Detection},
     booktitle = {Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on},
     year = {2015},
     pages = {1--5}}
    
  300. S. Vijayalakshmi V, B. Shwetha & S.V. Sathyanarayana
    Image classifier based digital image forensic detection-a review and simulations
    Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
    2015, pp. 23-28
    DOI: 10.1109/ERECT.2015.7498981
    BibTeX
    @inproceedings{VijayalakshmiV2015,
     author = {Vijayalakshmi V, S. and Shwetha, B. and Sathyanarayana, S. V.},
     title = {Image classifier based digital image forensic detection-a review and simulations},
     booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics},
     year = {2015},
     pages = {23--28}}
    
  301. B. Wang, Y. Tan, M. Zhao, Y. Guo & X. Kong
    Classifier Combination Based Source Identification for Cell Phone Images
    KSII Transactions on Internet and Information Systems (TIIS), 2015, Vol. 9(12), pp. 5087-5102
    DOI: 10.1109/chinasip.2015.7230528
    BibTeX
    @article{Wang2015b,
     author = {Wang, Bo and Tan, Yue and Zhao, Meijuan and Guo, Yanqing and Kong, Xiangwei},
     title = {Classifier Combination Based Source Identification for Cell Phone Images},
     journal = {KSII Transactions on Internet and Information Systems (TIIS)},
     year = {2015},
     volume = {9},
     number = {12},
     pages = {5087--5102}}
    
  302. C. Wang & T. Zhu
    A Survey of Digital Image Blind Detection Based on Tampering Trace
    Electronic Science and Technology, 2015
    BibTeX
    @article{Wang2015,
     author = {Wang, Chenlu and Zhu, Tingge},
     title = {A Survey of Digital Image Blind Detection Based on Tampering Trace},
     journal = {Electronic Science and Technology},
     year = {2015}}
    
  303. Z.H. Wang
    Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis
    Information, Computer and Application Engineering, 2015
    BibTeX
    @article{Wang2015a,
     author = {Wang, Zhi Hong},
     title = {Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis},
     journal = {Information, Computer and Application Engineering},
     year = {2015}}
    
  304. N.B.A. Warif, M.Y.I. Idris, A.W.A. Wahab & R. Salleh
    An Evaluation of Error Level Analysis in Image Forensics
    Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
    2015, pp. 23-28
    DOI: 10.1109/ICSEngT.2015.7412439
    BibTeX
    @inproceedings{Warif2015,
     author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.},
     title = {An Evaluation of Error Level Analysis in Image Forensics},
     booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)},
     year = {2015},
     pages = {23--28}}
    
  305. N.B.A. Warif, M.Y.I. Idris, A.W.A. Wahab & R. Salleh
    An evaluation of Error Level Analysis in image forensics
    Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
    2015, pp. 23-28
    DOI: 10.1109/ICSEngT.2015.7412439
    BibTeX
    @inproceedings{Warif2015a,
     author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.},
     title = {An evaluation of Error Level Analysis in image forensics},
     booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)},
     year = {2015},
     pages = {23--28}}
    
  306. M. Worring
    Multimedia Analytics for Image Collection Forensics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 305-327
    DOI: 10.1002/9781118705773.ch8
    BibTeX
    @incollection{Worring2015,
     author = {Worring, Marcel},
     title = {Multimedia Analytics for Image Collection Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {305--327}}
    
  307. H. Wu, X. Kong & S. Shang
    A Printer Forensics Method Using Halftone Dot Arrangement Model
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 861-865
    DOI: 10.1109/ChinaSIP.2015.7230527
    BibTeX
    @inproceedings{Wu2015,
     author = {Wu, Han and Kong, Xiangwei and Shang, Shize},
     title = {A Printer Forensics Method Using Halftone Dot Arrangement Model},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {861--865}}
    
  308. W.C. Wu, H.F. Hsu & P.Y. Lin
    Active tamper detection of digital images using VQ compression
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 508-509
    DOI: 10.1109/ICCE-TW.2015.7217025
    BibTeX
    @inproceedings{Wu2015b,
     author = {Wu, W. C. and Hsu, H. F. and Lin, P. Y.},
     title = {Active tamper detection of digital images using VQ compression},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {508--509}}
    
  309. G. Xu, J. Ye & Y.-Q. Shi
    New Developments in Image Tampering Detection
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_1
    BibTeX
    @article{Xu2015,
     author = {Xu, Guanshuo and Ye, Jingyu and Shi, Yun-Qing},
     title = {New Developments in Image Tampering Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  310. J. Xu, Y. Ling & X. Zheng
    Forensic Detection of Gaussian Low-pass Filtering in Digital Images
    Proc. 8th Int. Congress Image and Signal Processing (CISP)
    2015, pp. 819-823
    DOI: 10.1109/CISP.2015.7407990
    BibTeX
    @inproceedings{Xu2015a,
     author = {Xu, J. and Ling, Y. and Zheng, X.},
     title = {Forensic Detection of Gaussian Low-pass Filtering in Digital Images},
     booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)},
     year = {2015},
     pages = {819--823}}
    
  311. N. Yadav & R. Kapdi
    Copy move forgery detection using SIFT and GMM
    Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)
    2015, pp. 1-4
    DOI: 10.1109/NUICONE.2015.7449647
    BibTeX
    @inproceedings{Yadav2015,
     author = {Yadav, N. and Kapdi, R.},
     title = {Copy move forgery detection using SIFT and GMM},
     booktitle = {Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)},
     year = {2015},
     pages = {1--4}}
    
  312. B. Yang, X. Sun, X. Chen, J. Zhang & X. Li
    Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows
    The Computer Journal, 2015, Vol. 58(4), pp. 588-600
    DOI: 10.1093/comjnl/bxu146
    BibTeX
    @article{Yang2015e,
     author = {Yang, B. and Sun, X. and Chen, X. and Zhang, J. and Li, X.},
     title = {Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows},
     journal = {The Computer Journal},
     year = {2015},
     volume = {58},
     number = {4},
     pages = {588--600}}
    
  313. B. Yang, X. Sun, X. Xin, W. Hu & Y. Wu
    Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression
    Journal of Electronic Imaging, 2015, Vol. 24(6), pp. 063016
    DOI: 10.1117/1.JEI.24.6.063016
    BibTeX
    @article{Yang2015d,
     author = {Yang, Bin and Sun, Xingming and Xin, Xiangyang and Hu, Weifeng and Wu, Youxin},
     title = {Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {6},
     pages = {063016}}
    
  314. F. Yang & T. Gao
    Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram
    Advances in Image and Graphics Technologies
    Springer, 2015
    DOI: 10.1007/978-3-662-47791-5_51
    BibTeX
    @incollection{Yang2015c,
     author = {Yang, Fusheng and Gao, Tiegang},
     title = {Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram},
     booktitle = {Advances in Image and Graphics Technologies},
     publisher = {Springer},
     year = {2015}}
    
  315. J. Yang, G. Zhu, J. Huang & X. Zhao
    Estimating JPEG Compression History of Bitmaps Based on Factor Histogram
    Digital Signal Processing, 2015, Vol. 41, pp. 90-97
    DOI: 10.1016/j.dsp.2015.03.014
    BibTeX
    @article{Yang2015b,
     author = {Yang, Jianquan and Zhu, Guopu and Huang, Jiwu and Zhao, Xi},
     title = {Estimating JPEG Compression History of Bitmaps Based on Factor Histogram},
     journal = {Digital Signal Processing},
     year = {2015},
     volume = {41},
     pages = {90--97}}
    
  316. Q. Yang, F. Peng, J.-T. Li & M. Long
    Image Tamper Detection Based on Noise Estimation and Lacunarity Texture
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3079-2
    BibTeX
    @article{Yang2015a,
     author = {Yang, Qiuwei and Peng, Fei and Li, Jiao-Ting and Long, Min},
     title = {Image Tamper Detection Based on Noise Estimation and Lacunarity Texture},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  317. R. Yang, Z. Bai, L. Yin & H. Gao
    Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform
    Falco, C. M. & Jiang, X. (ed.)
    Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015
    Proc. SPIE, SPIE-Intl Soc Optical Eng, 2015, Vol. 9631, pp. 96310B-96310B-6
    DOI: 10.1117/12.2197146
    BibTeX
    @inproceedings{Yang2015,
     author = {Yang, Renqing and Bai, Zhengyao and Yin, Liguo and Gao, Hao},
     title = {Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform},
     booktitle = {Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015},
     journal = {Proc. SPIE},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2015},
     volume = {9631},
     pages = {96310B-96310B-6}}
    
  318. T. Yin, G. Yang, L. Li, D. Zhang & X. Sun
    Detecting Seam Carving Based Image Resizing Using Local Binary Patterns
    Computers & Security, Elsevier BV, 2015, Vol. 55, pp. 130-141
    DOI: 10.1016/j.cose.2015.09.003
    BibTeX
    @article{Yin2015,
     author = {Yin, Ting and Yang, Gaobo and Li, Leida and Zhang, Dengyong and Sun, Xingming},
     title = {Detecting Seam Carving Based Image Resizing Using Local Binary Patterns},
     journal = {Computers & Security},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {55},
     pages = {130--141}}
    
  319. S.N. Youseph & R.R. Cherian
    Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection
    Procedia Computer Science, 2015, Vol. 46(0), pp. 1635-1642
    DOI: 10.1016/j.procs.2015.02.099
    BibTeX
    @article{Youseph2015,
     author = {Youseph, Shahana N. and Cherian, Rajesh Roy},
     title = {Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {46},
     number = {0},
     pages = {1635--1642}}
    
  320. L. Yu, Q. Han, S.M. Yao & J. Fang
    An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis
    Forensic Science International, 2015
    DOI: 10.1016/j.forsciint.2015.10.024
    BibTeX
    @article{Yu2015,
     author = {Yu, Liyang and Han, Qi and Yao, S. M. and Fang, Junbin},
     title = {An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis},
     journal = {Forensic Science International},
     year = {2015}}
    
  321. M. Zampoglou, S. Papadopoulos & Y. Kompatsiaris
    Detecting Image Splicing in the Wild (web)
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169839
    BibTeX
    @inproceedings{Zampoglou2015,
     author = {Zampoglou, M. and Papadopoulos, S. and Kompatsiaris, Y.},
     title = {Detecting Image Splicing in the Wild (web)},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  322. F. Zeng, W. Wang, M. Tang & Z. Cao
    Exposing Blurred Image Forgeries through Blind Image Restoration
    Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid
    2015, pp. 466-469
    DOI: 10.1109/3PGCIC.2015.50
    BibTeX
    @inproceedings{Zeng2015b,
     author = {Zeng, F. and Wang, W. and Tang, M. and Cao, Z.},
     title = {Exposing Blurred Image Forgeries through Blind Image Restoration},
     booktitle = {Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid},
     year = {2015},
     pages = {466--469}}
    
  323. H. Zeng
    Rebuilding the Credibility of Sensor-based Camera Source Identification
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3072-9
    BibTeX
    @article{Zeng2015a,
     author = {Zeng, Hui},
     title = {Rebuilding the Credibility of Sensor-based Camera Source Identification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  324. H. Zeng, J. Chen, X. Kang & W. Zeng
    Removing Camera Fingerprint to Disguise Photograph Source
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 1687-1691
    DOI: 10.1109/ICIP.2015.7351088
    BibTeX
    @inproceedings{Zeng2015,
     author = {Zeng, Hui and Chen, Jiansheng and Kang, Xiangui and Zeng, Wenjun},
     title = {Removing Camera Fingerprint to Disguise Photograph Source},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {1687--1691}}
    
  325. L. Zhan & Y. Zhu
    Passive Forensics for Image Splicing Based on PCA Noise Estimation
    Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
    2015, pp. 78-83
    DOI: 10.1109/ICITST.2015.7412062
    BibTeX
    @inproceedings{Zhan2015,
     author = {Zhan, L. and Zhu, Y.},
     title = {Passive Forensics for Image Splicing Based on PCA Noise Estimation},
     booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)},
     year = {2015},
     pages = {78--83}}
    
  326. L. Zhan & Y. Zhu
    Passive forensics for image splicing based on PCA noise estimation
    Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
    2015, pp. 78-83
    DOI: 10.1109/ICITST.2015.7412062
    BibTeX
    @inproceedings{Zhan2015a,
     author = {Zhan, L. and Zhu, Y.},
     title = {Passive forensics for image splicing based on PCA noise estimation},
     booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)},
     year = {2015},
     pages = {78--83}}
    
  327. Y. Zhang, S. Li, S. Wang & X. Zhao
    Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain
    Mu, J., Liang, Q., Wang, W., Zhang, B. & Pi, Y. (ed.)
    The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2015, Vol. 322, pp. 723-731
    DOI: 10.1007/978-3-319-08991-1_75
    BibTeX
    @incollection{Zhang2015,
     author = {Zhang, Yujin and Li, Shenghong and Wang, Shilin and Zhao, Xudong},
     title = {Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain},
     booktitle = {The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {322},
     pages = {723--731}}
    
  328. F. Zhao, R. Zhang, H. Guo & Y. Zhang
    Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations
    Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICSPCC.2015.7338958
    BibTeX
    @inproceedings{Zhao2015c,
     author = {Zhao, Fuxing and Zhang, Rong and Guo, Haolong and Zhang, Yanhua},
     title = {Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations},
     booktitle = {Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf},
     year = {2015},
     pages = {1--5}}
    
  329. J.-H. Zhao
    Research on Image Passive Forensics Based on ASIFT and Circle Projection Features
    JSCUT(Natural Science Edition), 2015, Vol. 42(3)
    BibTeX
    @article{Zhao2015,
     author = {Zhao, Jun-Hong},
     title = {Research on Image Passive Forensics Based on ASIFT and Circle Projection Features},
     journal = {JSCUT(Natural Science Edition)},
     year = {2015},
     volume = {42},
     number = {3}}
    
  330. X. Zhao, S. Wang, S. Li & J. Li
    Passive Image-splicing Detection by a 2-D Noncausal Markov Model
    Circuits and Systems for Video Technology, IEEE Transactions on, 2015, Vol. 25(2), pp. 185-199
    DOI: 10.1109/TCSVT.2014.2347513
    BibTeX
    @article{Zhao2015a,
     author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua},
     title = {Passive Image-splicing Detection by a 2-D Noncausal Markov Model},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2015},
     volume = {25},
     number = {2},
     pages = {185--199}}
    
  331. H. Zhen & L. Jinjiang
    Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet
    nternational Journal of Multimedia and Ubiquitous Engineering, 2015, Vol. 10(7)
    DOI: 10.14257/ijmue.2015.10.7.25
    BibTeX
    @article{Zhen2015,
     author = {Zhen, Hua and Jinjiang, Li},
     title = {Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet},
     journal = {nternational Journal of Multimedia and Ubiquitous Engineering},
     year = {2015},
     volume = {10},
     number = {7}}
    
  332. J. Zheng, T. Zhu, Z. Li, W. Xing & J. Ren
    Exposing Image Forgery by Detecting Traces of Feather Operation
    Journal of Visual Languages & Computing, 2015, Vol. 27, pp. 9-18
    DOI: 10.1016/j.jvlc.2015.02.002
    BibTeX
    @article{Zheng2015,
     author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang},
     title = {Exposing Image Forgery by Detecting Traces of Feather Operation},
     journal = {Journal of Visual Languages & Computing},
     year = {2015},
     volume = {27},
     pages = {9--18}}
    
  333. J. Zhong & Y. Gan
    Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform
    Nonlinear Dynamics, Springer Netherlands, 2015, pp. 1-14
    DOI: 10.1007/s11071-015-2374-9
    BibTeX
    @article{Zhong2015a,
     author = {Zhong, Junliu and Gan, Yanfen},
     title = {Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform},
     journal = {Nonlinear Dynamics},
     publisher = {Springer Netherlands},
     year = {2015},
     pages = {1--14}}
    
  334. J. Zhong & Y. Gan
    Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection
    Advanced Science and Technology Letters, 2015
    DOI: 10.14257/astl.2015.81.05
    BibTeX
    @article{Zhong2015b,
     author = {Zhong, Junliu and Gan, Yanfen},
     title = {Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection},
     journal = {Advanced Science and Technology Letters},
     year = {2015}}
    
  335. J. Zhong, Y. Gan & S. Xie
    Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image
    Chaos, Solitons & Fractals, 2015, pp. -
    DOI: 10.1016/j.chaos.2015.10.010
    BibTeX
    @article{Zhong2015,
     author = {Zhong, Junliu and Gan, Yanfen and Xie, Shuai},
     title = {Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image},
     journal = {Chaos, Solitons & Fractals},
     year = {2015},
     pages = {-}}
    
  336. Z. ..P. .. Zhou, C. ..Y. .. Hu & C. ..J. .. Zhou
    Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise
    Zheng, D. (ed.)
    Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)
    Control, Mechatronics and Automation Technology, 2015, pp. 239243
    BibTeX
    @inproceedings{Zhou2015,
     author = {Zhou, Z. . P. . and Hu, C. . Y. . and Zhou, C. . J. .},
     title = {Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise},
     booktitle = {Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)},
     journal = {Control, Mechatronics and Automation Technology},
     year = {2015},
     pages = {239243}}
    
  337. Digital-Forensics and Watermarking
    Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
    Springer International Publishing, 2015
    BibTeX
    @book{Shi2015a,,
     title = {Digital-Forensics and Watermarking},
     publisher = {Springer International Publishing},
     year = {2015}}
    


2014

  1. A. Al-Ahmadi, Amani
    Image Forgery Detection Exploiting Image Randomness
    King Saud University College of Computer & Information Sciences Department of Computer Science, King Saud University College of Computer & Information Sciences Department of Computer Science, 2014
    DOI: 10.1109/cisp.2014.7003901
    BibTeX
    @mastersthesis{AlAhmadi2014,
     author = {Al-Ahmadi, Amani, Ahmad},
     title = {Image Forgery Detection Exploiting Image Randomness},
     school = {King Saud University College of Computer & Information Sciences Department of Computer Science},
     year = {2014}}
    
  2. M. Ali Qureshi & M. Deriche
    A Review on Copy Move Image Forgery Detection Techniques
    Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International
    2014, pp. 1-5
    DOI: 10.1109/SSD.2014.6808907
    BibTeX
    @inproceedings{AliQureshi2014,
     author = {Ali Qureshi, M. and Deriche, M.},
     title = {A Review on Copy Move Image Forgery Detection Techniques},
     booktitle = {Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International},
     year = {2014},
     pages = {1--5}}
    
  3. I. Amerini, F. Battisti, R. Caldelli, M. Carli & A. Costanzo
    Exploiting Perceptual Quality Issues in Countering SIFT-based Forensic Methods
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 2664-2668
    DOI: 10.1109/ICASSP.2014.6854083
    BibTeX
    @inproceedings{Amerini2014b,
     author = {Amerini, Irene and Battisti, F. and Caldelli, R. and Carli, M. and Costanzo, A.},
     title = {Exploiting Perceptual Quality Issues in Countering SIFT-based Forensic Methods},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {2664--2668}}
    
  4. I. Amerini, R. Becarelli, R. Caldelli & A.D. Mastio
    Splicing Forgeries Localization through the Use of First Digit Features
    2014 IEEE International Workshop on Information Forensics and Security (WIFS)
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 143-148
    DOI: 10.1109/WIFS.2014.7084318
    BibTeX
    @inproceedings{Amerini2014c,
     author = {Amerini, Irene and Becarelli, Rudy and Caldelli, Roberto and Mastio, Andrea Del},
     title = {Splicing Forgeries Localization through the Use of First Digit Features},
     booktitle = {2014 IEEE International Workshop on Information Forensics and Security (WIFS)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {143--148}}
    
  5. I. Amerini, R. Caldelli, P. Crescenzi, A.D. Mastio & A. Marino
    Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification
    Signal Processing: Image Communication, 2014(0), pp. -
    DOI: 10.1016/j.image.2014.07.003
    BibTeX
    @article{Amerini2014a,
     author = {Amerini, Irene and Caldelli, R. and Crescenzi, P. and Mastio, A. Del and Marino, A.},
     title = {Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification},
     journal = {Signal Processing: Image Communication},
     year = {2014},
     number = {0},
     pages = {-}}
    
  6. I. Amerini, R. Caldelli, A. Del Bimbo, A. Di Fuccia, L. Saravo & A.P. Rizzo
    Copy-move Forgery Detection from Printed Images
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280Y-90280Y-10
    DOI: 10.1117/12.2039509
    BibTeX
    @inproceedings{Amerini2014,
     author = {Amerini, Irene and Caldelli, Roberto and Del Bimbo, Alberto and Di Fuccia, Andrea and Saravo, Luigi and Rizzo, Anna Paola},
     title = {Copy-move Forgery Detection from Printed Images},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280Y-90280Y-10}}
    
  7. S. Amtullah & A. Koul
    Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images
    IOSR Journal of Computer Engineering (IOSR-JCE), 2014, Vol. 16(2), pp. 96-104
    DOI: 10.9790/0661-1621296104
    BibTeX
    @article{Amtullah2014,
     author = {Amtullah, Salma and Koul, Ajay},
     title = {Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images},
     journal = {IOSR Journal of Computer Engineering (IOSR-JCE)},
     year = {2014},
     volume = {16},
     number = {2},
     pages = {96--104}}
    
  8. V. Anand, M.F. Hashmi & A.G. Keskar
    A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods
    Nguyen, N., Attachoo, B., Trawiński, B. & Somboonviwat, K. (ed.)
    Intelligent Information and Database Systems
    Springer International Publishing, 2014, Vol. 8397, pp. 530-542
    DOI: 10.1007/978-3-319-05476-6_54
    BibTeX
    @incollection{Anand2014,
     author = {Anand, Vijay and Hashmi, Mohammad Farukh and Keskar, Avinash G.},
     title = {A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods},
     booktitle = {Intelligent Information and Database Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {8397},
     pages = {530--542}}
    
  9. M.S.R. Asati & M.P.R.Pardhi
    Exposing Digital Image Forgeries by Illumination Color Classification
    International Journal of Engineering Trends and Technology, 2014, Vol. 18(6), pp. 269-271
    DOI: 10.14445/22315381/IJETT-V18P255
    BibTeX
    @article{Asati2014,
     author = {Asati, Ms. Shraddha R. and P.R.Pardhi, Mr.},
     title = {Exposing Digital Image Forgeries by Illumination Color Classification},
     journal = {International Journal of Engineering Trends and Technology},
     year = {2014},
     volume = {18},
     number = {6},
     pages = {269--271}}
    
  10. D.A. Ayalneh, H.J. Kim & Y.S. Choi
    JPEG Copy Paste Forgery Detection Using Bag Optimized for Complex Images
    Advanced Communication Technology (ICACT), 2014 16th International Conference on
    2014, pp. 181-185
    DOI: 10.1109/ICACT.2014.6778945
    BibTeX
    @inproceedings{Ayalneh2014,
     author = {Ayalneh, Dessalegn Atnafu and Kim, Hyoung Joong and Choi, Yong Soo},
     title = {JPEG Copy Paste Forgery Detection Using Bag Optimized for Complex Images},
     booktitle = {Advanced Communication Technology (ICACT), 2014 16th International Conference on},
     year = {2014},
     pages = {181--185}}
    
  11. K. Bahrami & A.C. Kot
    Image Tampering Detection by Exposing Blur Type Inconsistency
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 2654-2658
    DOI: 10.1109/ICASSP.2014.6854081
    BibTeX
    @inproceedings{Bahrami2014,
     author = {Bahrami, K. and Kot, A. C.},
     title = {Image Tampering Detection by Exposing Blur Type Inconsistency},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {2654--2658}}
    
  12. G. Bhartiya & A.S. Jalal
    Image Forgery Detection Using Feature Based Clustering in JPEG Images
    Industrial and Information Systems (ICIIS), 2014 9th International Conference on
    2014, pp. 1-5
    DOI: 10.1109/ICIINFS.2014.7036583
    BibTeX
    @inproceedings{Bhartiya2014,
     author = {Bhartiya, Gunjan and Jalal, Anand Singh},
     title = {Image Forgery Detection Using Feature Based Clustering in JPEG Images},
     booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on},
     year = {2014},
     pages = {1--5}}
    
  13. G.K. Birajdar & V.H. Mankar
    Blind Method for Rescaling Detection and Rescale Factor Estimation in Digital Images Using Periodic Properties of Interpolation
    AEU - International Journal of Electronics and Communications, 2014(0), pp. -
    DOI: 10.1016/j.aeue.2014.01.013
    BibTeX
    @article{Birajdar2014,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Blind Method for Rescaling Detection and Rescale Factor Estimation in Digital Images Using Periodic Properties of Interpolation},
     journal = {AEU - International Journal of Electronics and Communications},
     year = {2014},
     number = {0},
     pages = {-}}
    
  14. S. Bo, Y. Quan-qiao, W. Shi-lin, Z. Cheng-lin & L. Shen-ghong
    Image Splicing Detection Based on Improved Markov Model
    Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
    The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2014, Vol. 246, pp. 127-135
    DOI: 10.1007/978-3-319-00536-2_15
    BibTeX
    @incollection{Bo2014,
     author = {Bo, Su and Quan-qiao, Yuan and Shi-lin, Wang and Cheng-lin, Zhao and Shen-ghong, Li},
     title = {Image Splicing Detection Based on Improved Markov Model},
     booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {246},
     pages = {127--135}}
    
  15. H. Bojinov, D. Boneh, Y. Michakevsky & G. Nakibly
    Mobile Device Identification Via Sensor Fingerprinting
    2014
    BibTeX
    @electronic{Bojinov2014,
     author = {Bojinov, Hristo and Boneh, Dan and Michakevsky, Yan and Nakibly, Gabi},
     title = {Mobile Device Identification Via Sensor Fingerprinting},
     year = {2014}}
    
  16. G. Cao, Y. Zhao, R. Ni & X. Li
    Contrast Enhancement Based Forensics in Digital Images
    Information Forensics and Security, IEEE Transactions on, Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(99), pp. 515-525
    DOI: 10.1109/TIFS.2014.2300937
    BibTeX
    @article{Cao2014a,
     author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.},
     title = {Contrast Enhancement Based Forensics in Digital Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     volume = {9},
     number = {99},
     pages = {515--525}}
    
  17. G. Cao, Y. Zhao, R. Ni & X. Li
    Contrast Enhancement-Based Forensics in Digital Images
    #IEEE_J_IFS#, 2014, Vol. 9(3), pp. 515-525
    DOI: 10.1109/TIFS.2014.2300937
    BibTeX
    @article{Cao2014c,
     author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.},
     title = {Contrast Enhancement-Based Forensics in Digital Images},
     journal = {#IEEE_J_IFS#},
     year = {2014},
     volume = {9},
     number = {3},
     pages = {515--525}}
    
  18. G. Cao, Y. Zhao, R. Ni, B. Ou & Y. Wang
    Forensic Detection of Noise Addition in Digital Images
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2014, Vol. 23(2), pp. 023004
    DOI: 10.1117/1.JEI.23.2.023004
    BibTeX
    @article{Cao2014b,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Ou, Bo and Wang, Yongbin},
     title = {Forensic Detection of Noise Addition in Digital Images},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2014},
     volume = {23},
     number = {2},
     pages = {023004}}
    
  19. G. Cao, Y. Zhao, R. Ni, H. Tian & L. Yu
    Attacking Contrast Enhancement Forensics in Digital Images
    Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(5), pp. 1-13
    DOI: 10.1007/s11432-013-4928-0
    BibTeX
    @article{Cao2014,
     author = {Cao, Gang and Zhao, Yao and Ni, RongRong and Tian, HuaWei and Yu, LiFang},
     title = {Attacking Contrast Enhancement Forensics in Digital Images},
     journal = {Science China Information Sciences},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {57},
     number = {5},
     pages = {1--13}}
    
  20. G. Cattaneo & G. Roscigno
    A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms
    Network-Based Information Systems (NBiS), 2014 17th International Conference on
    2014, pp. 279-286
    DOI: 10.1109/NBiS.2014.82
    BibTeX
    @inproceedings{Cattaneo2014a,
     author = {Cattaneo, G. and Roscigno, G.},
     title = {A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms},
     booktitle = {Network-Based Information Systems (NBiS), 2014 17th International Conference on},
     year = {2014},
     pages = {279--286}}
    
  21. G. Cattaneo, G. Roscigno & U.F. Petrillo
    A Scalable Approach to Source Camera Identification Over Hadoop
    Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
    2014, pp. 366-373
    DOI: 10.1109/AINA.2014.47
    BibTeX
    @inproceedings{Cattaneo2014,
     author = {Cattaneo, G. and Roscigno, G. and Petrillo, U. F.},
     title = {A Scalable Approach to Source Camera Identification Over Hadoop},
     booktitle = {Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on},
     year = {2014},
     pages = {366--373}}
    
  22. T.-Y. Chang, S.-C. Tai & G.-S. Lin
    A Passive Multi-purpose Scheme Based on Periodicity Analysis of CFA Artifacts for Image Forensics
    Journal of Visual Communication and Image Representation, 2014(0), pp. -
    DOI: 10.1016/j.jvcir.2014.04.010
    BibTeX
    @article{Chang2014,
     author = {Chang, Tang-You and Tai, Shen-Chuan and Lin, Guo-Shiang},
     title = {A Passive Multi-purpose Scheme Based on Periodicity Analysis of CFA Artifacts for Image Forensics},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2014},
     number = {0},
     pages = {-}}
    
  23. A. Cheddad
    Digital Forgery
    The Encyclopedia of Criminology and Criminal Justice
    Blackwell Publishing Ltd, 2014
    DOI: 10.1002/9781118517383.wbeccj132
    BibTeX
    @inbook{Cheddad2014,
     author = {Cheddad, Abbas},
     title = {Digital Forgery},
     booktitle = {The Encyclopedia of Criminology and Criminal Justice},
     publisher = {Blackwell Publishing Ltd},
     year = {2014}}
    
  24. C. Chen, H. Li, W. Luo, R. Yang & J. Huang
    Anti-forensics of JPEG Detectors Via Adaptive Quantization Table Replacement
    Proc. 22nd Int Pattern Recognition (ICPR) Conf
    2014, pp. 672-677
    DOI: 10.1109/ICPR.2014.126
    BibTeX
    @inproceedings{Chen2014a,
     author = {Chen, C. and Li, H. and Luo, W. and Yang, R. and Huang, J.},
     title = {Anti-forensics of JPEG Detectors Via Adaptive Quantization Table Replacement},
     booktitle = {Proc. 22nd Int Pattern Recognition (ICPR) Conf},
     year = {2014},
     pages = {672--677}}
    
  25. C. Chen, J. Ni & Z. Shen
    Effective Estimation of Image Rotation Angle Using Spectral Method
    IEEE Signal Processing Letters, 2014, Vol. 21(7), pp. 890-894
    DOI: 10.1109/LSP.2014.2320503
    BibTeX
    @article{Chen2014b,
     author = {Chen, C. and Ni, J. and Shen, Z.},
     title = {Effective Estimation of Image Rotation Angle Using Spectral Method},
     journal = {IEEE Signal Processing Letters},
     year = {2014},
     volume = {21},
     number = {7},
     pages = {890--894}}
    
  26. Z. Chen, Y. Zhao & R. Ni
    Detecting the operation chain in digital images by type and order fingerprint
    Proc. 12th Int. Conf. Signal Processing (ICSP)
    2014, pp. 1837-1842
    DOI: 10.1109/ICOSP.2014.7015310
    BibTeX
    @inproceedings{Chen2014,
     author = {Chen, Z. and Zhao, Y. and Ni, R.},
     title = {Detecting the operation chain in digital images by type and order fingerprint},
     booktitle = {Proc. 12th Int. Conf. Signal Processing (ICSP)},
     year = {2014},
     pages = {1837--1842}}
    
  27. G. Chierchia, D. Cozzolino, G. Poggi, C. Sansone & L. Verdoliva
    Guided Filtering for PRNU-based Localization of Small-size Image Forgeries
    2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
    International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Institute of Electrical & Electronics Engineers (IEEE), 2014
    DOI: 10.1109/icassp.2014.6854802
    BibTeX
    @article{Chierchia2014a,
     author = {Chierchia, G. and Cozzolino, D. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Guided Filtering for PRNU-based Localization of Small-size Image Forgeries},
     booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
     journal = {International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014}}
    
  28. G. Chierchia, D. Cozzolino, G. Poggi, C. Sansone & L. Verdoliva
    Guided Filtering for PRNU-based Localization of Small-size Image Forgeries
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 6231-6235
    DOI: 10.1109/ICASSP.2014.6854802
    BibTeX
    @inproceedings{Chierchia2014b,
     author = {Chierchia, G. and Cozzolino, D. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Guided Filtering for PRNU-based Localization of Small-size Image Forgeries},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {6231--6235}}
    
  29. G. Chierchia, G. Poggi, C. Sansone & L. Verdoliva
    A Bayesian-mrf Approach for PRNU-based Image Forgery Detection
    IEEE Trans.Inform.Forensic Secur., Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(4), pp. 554-567
    DOI: 10.1109/TIFS.2014.2302078
    BibTeX
    @article{Chierchia2014,
     author = {Chierchia, Giovanni and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {A Bayesian-mrf Approach for PRNU-based Image Forgery Detection},
     journal = {IEEE Trans.Inform.Forensic Secur.},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     volume = {9},
     number = {4},
     pages = {554--567}}
    
  30. T. Chihaoui, S. Bourouis & K. Hamrouni
    Copy-move Image Forgery Detection Based on SIFT Descriptors and SVD-matching
    Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on
    2014, pp. 125-129
    DOI: 10.1109/ATSIP.2014.6834590
    BibTeX
    @inproceedings{Chihaoui2014,
     author = {Chihaoui, T. and Bourouis, S. and Hamrouni, K.},
     title = {Copy-move Image Forgery Detection Based on SIFT Descriptors and SVD-matching},
     booktitle = {Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on},
     year = {2014},
     pages = {125--129}}
    
  31. G.B. Chittapur, S. Murali, H.S. Prabhakara & B.S. Anami
    Exposing Digital Forgery in Video by Mean Frame Comparison Techniques
    Emerging Research in Electronics, Computer Science and Technology
    Springer, 2014
    DOI: 10.1007/978-81-322-1157-0_57
    BibTeX
    @incollection{Chittapur2014,
     author = {Chittapur, Govindraj B. and Murali, S. and Prabhakara, H. S. and Anami, Basavaraj S.},
     title = {Exposing Digital Forgery in Video by Mean Frame Comparison Techniques},
     booktitle = {Emerging Research in Electronics, Computer Science and Technology},
     publisher = {Springer},
     year = {2014}}
    
  32. X. Chu, Y. Chen, M.C. Stamm & K.J.R. Liu
    Information theoretical limit of compression forensics
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2689-2693
    DOI: 10.1109/ICASSP.2014.6854088
    BibTeX
    @inproceedings{Chu2014,
     author = {Chu, X. and Chen, Y. and Stamm, M. C. and Liu, K. J. R.},
     title = {Information theoretical limit of compression forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2689--2693}}
    
  33. V. Conotter, E. Bodnari, G. Boato & H. Farid
    Physiologically-based Detection of Computer Generated Faces in Video
    Proc. IEEE Int Image Processing (ICIP) Conf
    2014, pp. 248-252
    DOI: 10.1109/ICIP.2014.7025049
    BibTeX
    @inproceedings{Conotter2014,
     author = {Conotter, V. and Bodnari, E. and Boato, G. and Farid, H.},
     title = {Physiologically-based Detection of Computer Generated Faces in Video},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2014},
     pages = {248--252}}
    
  34. A. Costanzo Piccinnano
    Techniques for Digital Image Forensics and Counter-forensics
    Università degli studi di siena, Università degli studi di siena, 2014
    BibTeX
    @phdthesis{Costanzo2014a,
     author = {Costanzo Piccinnano, Andrea},
     title = {Techniques for Digital Image Forensics and Counter-forensics},
     school = {Università degli studi di siena},
     year = {2014}}
    
  35. A. Costanzo, I. Amerini, R. Caldelli & M. Barni
    Forensic Analysis of SIFT Keypoint Removal and Injection
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(9), pp. 1450-1464
    DOI: 10.1109/TIFS.2014.2337654
    BibTeX
    @article{Costanzo2014,
     author = {Costanzo, A. and Amerini, Irene and Caldelli, R. and Barni, Mauro},
     title = {Forensic Analysis of SIFT Keypoint Removal and Injection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {9},
     pages = {1450--1464}}
    
  36. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image Forgery Detection through Residual-based Local Descriptors and Block-matching
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5297-5301
    DOI: 10.1109/ICIP.2014.7026072
    BibTeX
    @inproceedings{Cozzolino2014a,
     author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.},
     title = {Image Forgery Detection through Residual-based Local Descriptors and Block-matching},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5297--5301}}
    
  37. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image Forgery Localization through the Fusion of Camera-based, Feature-based and Pixel-based Techniques
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5302-5306
    DOI: 10.1109/ICIP.2014.7026073
    BibTeX
    @inproceedings{Cozzolino2014b,
     author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.},
     title = {Image Forgery Localization through the Fusion of Camera-based, Feature-based and Pixel-based Techniques},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5302--5306}}
    
  38. D. Cozzolino, G. Poggi & L. Verdoliva
    Copy-move Forgery Detection Based on Patchmatch
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5312-5316
    DOI: 10.1109/ICIP.2014.7026075
    BibTeX
    @inproceedings{Cozzolino2014,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Copy-move Forgery Detection Based on Patchmatch},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5312--5316}}
    
  39. S. Dadkhah, A.A. Manaf & S. Sadeghi
    Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking
    Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
    Springer, 2014
    DOI: 10.1007/978-3-662-43616-5_5
    BibTeX
    @incollection{Dadkhah2014,
     author = {Dadkhah, Sajjad and Manaf, Azizah Abd and Sadeghi, Somayeh},
     title = {Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking},
     booktitle = {Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations},
     publisher = {Springer},
     year = {2014}}
    
  40. D.T. Dang-Nguyen, V. Conotter, G. Boato & F.G.B.D. Natale
    Video forensics based on expression dynamics
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2014, pp. 161-166
    DOI: 10.1109/WIFS.2014.7084321
    BibTeX
    @inproceedings{Dang-Nguyen2014a,
     author = {Dang-Nguyen, D. T. and Conotter, V. and Boato, G. and Natale, F. G. B. De},
     title = {Video forensics based on expression dynamics},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2014},
     pages = {161--166}}
    
  41. D.-T. Dang-Nguyen
    Discrimination of Computer Generated Versus Natural Human Faces
    University of Trento, UNITN, University of Trento, UNITN, 2014
    BibTeX
    @phdthesis{Dang-Nguyen2014,
     author = {Dang-Nguyen, Duc-Tien},
     title = {Discrimination of Computer Generated Versus Natural Human Faces},
     school = {University of Trento, UNITN},
     year = {2014}}
    
  42. A. De Rosa, A. Piva, M. Fontani & M. Iuliani
    Investigating Multimedia Contents
    Security Technology (ICCST), 2014 International Carnahan Conference on
    2014, pp. 1-6
    DOI: 10.1109/CCST.2014.6986976
    BibTeX
    @inproceedings{DeRosa2014,
     author = {De Rosa, A. and Piva, A. and Fontani, M. and Iuliani, M.},
     title = {Investigating Multimedia Contents},
     booktitle = {Security Technology (ICCST), 2014 International Carnahan Conference on},
     year = {2014},
     pages = {1--6}}
    
  43. S. Debbarma, A.B. Singh & K.M. Singh
    Keypoints Based Copy-move Forgery Detection of Digital Images
    Proc. Int Informatics, Electronics Vision (ICIEV) Conf
    2014, pp. 1-5
    DOI: 10.1109/ICIEV.2014.7135994
    BibTeX
    @inproceedings{Debbarma2014,
     author = {Debbarma, S. and Singh, A. B. and Singh, K. M.},
     title = {Keypoints Based Copy-move Forgery Detection of Digital Images},
     booktitle = {Proc. Int Informatics, Electronics Vision (ICIEV) Conf},
     year = {2014},
     pages = {1--5}}
    
  44. L. Debiasi, A. Uhl & Z. Sun
    Generation of Iris Sensor PRNU Fingerprints from Uncorrelated Data
    Biometrics and Forensics (IWBF), 2014 International Workshop on
    2014, pp. 1-6
    DOI: 10.1109/IWBF.2014.6914262
    BibTeX
    @inproceedings{Debiasi2014,
     author = {Debiasi, Luca and Uhl, Andreas and Sun, Zhenan},
     title = {Generation of Iris Sensor PRNU Fingerprints from Uncorrelated Data},
     booktitle = {Biometrics and Forensics (IWBF), 2014 International Workshop on},
     year = {2014},
     pages = {1--6}}
    
  45. W.N.N. Diane, S. Xingming & F. KueMoise
    A Survey of Partition-based Techniques for Copy-move Forgery Detection
    The Scientific World Journal, 2014
    DOI: 10.1155/2014/975456
    BibTeX
    @article{Diane2014,
     author = {Diane, Wandji Nanda Nathalie and Xingming, Sun and KueMoise, Fah},
     title = {A Survey of Partition-based Techniques for Copy-move Forgery Detection},
     journal = {The Scientific World Journal},
     year = {2014}}
    
  46. H.G. Dietz
    Out-of-focus Point Spread Functions
    Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)
    Proc. SPIE, 2014, Vol. 9023, pp. 90230J-90230J-11
    DOI: 10.1117/12.2040490
    BibTeX
    @inproceedings{Dietz2014,
     author = {Dietz, Henry Gordon},
     title = {Out-of-focus Point Spread Functions},
     booktitle = {Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9023},
     pages = {90230J-90230J-11}}
    
  47. F. Ding, G. Zhu & Y.Q. Shi
    A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_13
    BibTeX
    @article{Ding2014,
     author = {Ding, Feng and Zhu, Guopu and Shi, Yun Qing},
     title = {A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  48. A.E. Dirik & A. Karakücük
    Forensic Use of Photo Response Non-uniformity of Imaging Sensors and a Counter Method
    Optics Express, 2014, Vol. 22(1), pp. -
    DOI: 10.1364/oe.22.000470
    BibTeX
    @article{Dirik2014,
     author = {Dirik, Ahmet Emir and Karakücük, Ahmet},
     title = {Forensic Use of Photo Response Non-uniformity of Imaging Sensors and a Counter Method},
     journal = {Optics Express},
     year = {2014},
     volume = {22},
     number = {1},
     pages = {-}}
    
  49. A.E. Dirik, H.T. Sencar & N. Memon
    Analysis of Seam-carving-based Anonymization of Images against PRNU Noise Pattern-based Source Attribution
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(12), pp. 2277-2290
    DOI: 10.1109/TIFS.2014.2361200
    BibTeX
    @article{Dirik2014a,
     author = {Dirik, A. E. and Sencar, H. T. and Memon, N.},
     title = {Analysis of Seam-carving-based Anonymization of Images against PRNU Noise Pattern-based Source Attribution},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {12},
     pages = {2277--2290}}
    
  50. M. Doyoddorj & K.-H. Rhee
    Robust Copy-move Forgery Detection Based on Dual-transform
    Digital Forensics and Cyber Crime
    Digital Forensics and Cyber Crime, Springer, 2014
    DOI: 10.1007/978-3-319-14289-0_1
    BibTeX
    @incollection{Doyoddorj2014,
     author = {Doyoddorj, Munkhbaatar and Rhee, Kyung-Hyune},
     title = {Robust Copy-move Forgery Detection Based on Dual-transform},
     booktitle = {Digital Forensics and Cyber Crime},
     journal = {Digital Forensics and Cyber Crime},
     publisher = {Springer},
     year = {2014}}
    
  51. D. Dupplaw, M. Matthews, R. Johansson, G. Boato, A. Costanzo, M. Fontani, E. Minack, E. Demidova, R. Blanco, T. Griffiths, P. Lewis, J. Hare & A. Moschitti
    Information Extraction from Multimedia Web Documents: An Open-source Platform and Testbed
    International Journal of Multimedia Information Retrieval, Springer London, 2014, pp. 1-15
    DOI: 10.1007/s13735-014-0051-2
    BibTeX
    @article{Dupplaw2014,
     author = {Dupplaw, DavidPaul and Matthews, Michael and Johansson, Richard and Boato, Giulia and Costanzo, Andrea and Fontani, Marco and Minack, Enrico and Demidova, Elena and Blanco, Roi and Griffiths, Thomas and Lewis, Paul and Hare, Jonathon and Moschitti, Alessandro},
     title = {Information Extraction from Multimedia Web Documents: An Open-source Platform and Testbed},
     journal = {International Journal of Multimedia Information Retrieval},
     publisher = {Springer London},
     year = {2014},
     pages = {1--15}}
    
  52. E.-S.M. El-Alfy & M.A. Qureshi
    Combining Spatial and DCT Based Markov Features for Enhanced Blind Detection of Image Splicing
    Pattern Analysis and Applications, Springer London, 2014, pp. 1-11
    DOI: 10.1007/s10044-014-0396-4
    BibTeX
    @article{El-Alfy2014,
     author = {El-Alfy, E.-Sayed M. and Qureshi, Muhammad Ali},
     title = {Combining Spatial and DCT Based Markov Features for Enhanced Blind Detection of Image Splicing},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer London},
     year = {2014},
     pages = {1--11}}
    
  53. S. Elkasrawi & F. Shafait
    Printer Identification Using Supervised Learning for Document Forgery Detection
    2014
    DOI: 10.1109/das.2014.48
    BibTeX
    @misc{Elkasrawi2014,
     author = {Elkasrawi, Sara and Shafait, Faisal},
     title = {Printer Identification Using Supervised Learning for Document Forgery Detection},
     year = {2014}}
    
  54. S.M. Fadl & N.A. Semary
    A Proposed Accelerated Image Copy-move Forgery Detection
    Visual Communications and Image Processing Conference, 2014 IEEE
    2014, pp. 253-257
    DOI: 10.1109/VCIP.2014.7051552
    BibTeX
    @inproceedings{Fadl2014a,
     author = {Fadl, S. M. and Semary, N. A.},
     title = {A Proposed Accelerated Image Copy-move Forgery Detection},
     booktitle = {Visual Communications and Image Processing Conference, 2014 IEEE},
     year = {2014},
     pages = {253--257}}
    
  55. S.M. Fadl, N.A. Semary & M.M. Hadhoud
    Copy-rotate-move Forgery Detection Based on Spatial Domain
    Computer Engineering & Systems (ICCES), 2014 9th International Conference on
    2014, pp. 136-141
    DOI: 10.1109/ICCES.2014.7030944
    BibTeX
    @inproceedings{Fadl2014,
     author = {Fadl, S. M. and Semary, N. A. and Hadhoud, M. M.},
     title = {Copy-rotate-move Forgery Detection Based on Spatial Domain},
     booktitle = {Computer Engineering & Systems (ICCES), 2014 9th International Conference on},
     year = {2014},
     pages = {136--141}}
    
  56. S.M. Fadl, N.A. Semary & M.M. Hadhoud
    Fan Search for Image Copy-move Forgery Detection
    Advanced Machine Learning Technologies and Applications
    Springer, 2014
    DOI: 10.1007/978-3-319-13461-1_18
    BibTeX
    @incollection{Fadl2014b,
     author = {Fadl, Sondos M. and Semary, Noura A. and Hadhoud, Mohiy M.},
     title = {Fan Search for Image Copy-move Forgery Detection},
     booktitle = {Advanced Machine Learning Technologies and Applications},
     publisher = {Springer},
     year = {2014}}
    
  57. G. Fahmy
    Nonorthogonal DCT Implementation for JPEG Forensics
    Hybrid Intelligent Systems (HIS), 2014 14th International Conference on
    2014, pp. 7-11
    DOI: 10.1109/HIS.2014.7086195
    BibTeX
    @inproceedings{Fahmy2014,
     author = {Fahmy, G.},
     title = {Nonorthogonal DCT Implementation for JPEG Forensics},
     booktitle = {Hybrid Intelligent Systems (HIS), 2014 14th International Conference on},
     year = {2014},
     pages = {7--11}}
    
  58. G. Fahmy
    Nonorthogonal DCT Block Convergence for JPEG-75 Forensics
    Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)
    2014, pp. 000349-000353
    DOI: 10.1109/ISSPIT.2014.7300613
    BibTeX
    @inproceedings{Fahmy2014a,
     author = {Fahmy, G.},
     title = {Nonorthogonal DCT Block Convergence for JPEG-75 Forensics},
     booktitle = {Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)},
     year = {2014},
     pages = {000349--000353}}
    
  59. W. Fan, K. Wang, F. Cayre & Z. Xiong
    JPEG Anti-forensics with Improved Tradeoff between Forensic Undetectability and Image Quality
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1211-1226
    DOI: 10.1109/TIFS.2014.2317949
    BibTeX
    @article{Fan2014,
     author = {Fan, Wei and Wang, Kai and Cayre, F. and Xiong, Zhang},
     title = {JPEG Anti-forensics with Improved Tradeoff between Forensic Undetectability and Image Quality},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {8},
     pages = {1211--1226}}
    
  60. W. Fan, K. Wang, F. Cayre & Z. Xiong
    JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality
    #IEEE_J_IFS#, 2014, Vol. 9(8), pp. 1211-1226
    DOI: 10.1109/TIFS.2014.2317949
    BibTeX
    @article{Fan2014a,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality},
     journal = {#IEEE_J_IFS#},
     year = {2014},
     volume = {9},
     number = {8},
     pages = {1211--1226}}
    
  61. S.A. Fattah, M.M.I. Ullah, M. Ahmed, I. Ahmmed & C. Shahnaz
    A Scheme for Copy-move Forgery Detection in Digital Images Based on 2D-DWT
    Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on
    2014, pp. 801-804
    DOI: 10.1109/MWSCAS.2014.6908536
    BibTeX
    @inproceedings{Fattah2014,
     author = {Fattah, S. A. and Ullah, M. M. I. and Ahmed, M. and Ahmmed, I. and Shahnaz, C.},
     title = {A Scheme for Copy-move Forgery Detection in Digital Images Based on 2D-DWT},
     booktitle = {Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on},
     year = {2014},
     pages = {801--804}}
    
  62. A. Ferreira & A. Rocha
    A Multiscale and Multi-perturbation Blind Forensic Technique for Median Detecting
    Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
    Springer Science mathplus Business Media, 2014, pp. 302-310
    DOI: 10.1007/978-3-319-12568-8_37
    BibTeX
    @incollection{Ferreira2014,
     author = {Ferreira, Anselmo and Rocha, Anderson},
     title = {A Multiscale and Multi-perturbation Blind Forensic Technique for Median Detecting},
     booktitle = {Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications},
     publisher = {Springer Science mathplus Business Media},
     year = {2014},
     pages = {302--310}}
    
  63. M. Fontani
    Digital Forensic Techniques for Splicing Detection in Multimedia Contents
    UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche, UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche, 2014
    BibTeX
    @phdthesis{Fontani2014a,
     author = {Fontani, Marco},
     title = {Digital Forensic Techniques for Splicing Detection in Multimedia Contents},
     school = {UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche},
     year = {2014}}
    
  64. M. Fontani, A. Bonchi, A. Piva & M. Barni
    Countering Anti-forensics by Means of Data Fusion
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280Z-90280Z-15
    DOI: 10.1117/12.2039569
    BibTeX
    @inproceedings{Fontani2014,
     author = {Fontani, Marco and Bonchi, Alessandro and Piva, Alessandro and Barni, Mauro},
     title = {Countering Anti-forensics by Means of Data Fusion},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280Z-90280Z-15}}
    
  65. K. Francis, S. Gholap & P.K. Bora
    Illuminant Colour Based Image Forensics Using Mismatch in Human Skin Highlights
    Communications (NCC), 2014 Twentieth National Conference on
    2014, pp. 1-6
    DOI: 10.1109/NCC.2014.6811349
    BibTeX
    @inproceedings{Francis2014,
     author = {Francis, Kiran and Gholap, Sandeep and Bora, P. K.},
     title = {Illuminant Colour Based Image Forensics Using Mismatch in Human Skin Highlights},
     booktitle = {Communications (NCC), 2014 Twentieth National Conference on},
     year = {2014},
     pages = {1--6}}
    
  66. K. Francis, S. Gholap & P.K. Bora
    Illuminant colour based image forensics using mismatch in human skin highlights
    Proc. Twentieth National Conf. Communications (NCC)
    2014, pp. 1-6
    DOI: 10.1109/NCC.2014.6811349
    BibTeX
    @inproceedings{Francis2014a,
     author = {Francis, K. and Gholap, S. and Bora, P. K.},
     title = {Illuminant colour based image forensics using mismatch in human skin highlights},
     booktitle = {Proc. Twentieth National Conf. Communications (NCC)},
     year = {2014},
     pages = {1--6}}
    
  67. L. Gaborini
    Image Tampering Detection and Localization
    Politecnico di Milano, Politecnico di Milano, 2014
    BibTeX
    @mastersthesis{Gaborini2014,
     author = {Gaborini, Lorenzo},
     title = {Image Tampering Detection and Localization},
     school = {Politecnico di Milano},
     year = {2014}}
    
  68. L. Gaborini, P. Bestagini, S. Milani, M. Tagliasacchi & S. Tubaro
    Multi-clue Image Tampering Localization
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 125-130
    DOI: 10.1109/WIFS.2014.7084315
    BibTeX
    @inproceedings{Gaborini2014a,
     author = {Gaborini, L. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Multi-clue Image Tampering Localization},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {125--130}}
    
  69. F. Galvan, G. Puglisi, A.R. Bruna & S. Battiato
    First Quantization Matrix Estimation from Double Compressed JPEG Images
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1299-1310
    DOI: 10.1109/TIFS.2014.2330312
    BibTeX
    @article{Galvan2014,
     author = {Galvan, F. and Puglisi, Giovanni and Bruna, A. R. and Battiato, Sebastiano},
     title = {First Quantization Matrix Estimation from Double Compressed JPEG Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {8},
     pages = {1299--1310}}
    
  70. Y. Gan & J. Zhong
    Image Copy-move Tamper Blind Detection Algorithm Based on Integrated Feature Vectors
    Journal of Chemical and Pharmaceutical Research, 2014, Vol. 6(6), pp. 1584-1590
    BibTeX
    @article{Gan2014,
     author = {Gan, Yanfen and Zhong, Junli},
     title = {Image Copy-move Tamper Blind Detection Algorithm Based on Integrated Feature Vectors},
     journal = {Journal of Chemical and Pharmaceutical Research},
     year = {2014},
     volume = {6},
     number = {6},
     pages = {1584--1590}}
    
  71. S. Gao, C. Zhang, C.-L. Wu, G. Ye & L. Huang
    A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photographic Image
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_22
    BibTeX
    @article{Gao2014,
     author = {Gao, Shang and Zhang, Cong and Wu, Chan-Le and Ye, Gang and Huang, Lei},
     title = {A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photographic Image},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  72. H. Ge & H. Malik
    Exposing image forgery using inconsistent reflection vanishing point
    Proc. Int Audio, Language and Image Processing (ICALIP) Conf
    2014, pp. 282-286
    DOI: 10.1109/ICALIP.2014.7009801
    BibTeX
    @inproceedings{Ge2014a,
     author = {Ge, H. and Malik, H.},
     title = {Exposing image forgery using inconsistent reflection vanishing point},
     booktitle = {Proc. Int Audio, Language and Image Processing (ICALIP) Conf},
     year = {2014},
     pages = {282--286}}
    
  73. L. Ge
    Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization
    Journal of Multimedia, 2014, Vol. 9(3)
    BibTeX
    @article{Ge2014,
     author = {Ge, Lu},
     title = {Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization},
     journal = {Journal of Multimedia},
     year = {2014},
     volume = {9},
     number = {3}}
    
  74. B. Gencturk, V. Nabiyev, G. Ulutas & M. Ulutas
    A Hybrid Image Authentication Method Robust to JPEG Attacks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 1596-1599
    DOI: 10.1109/SIU.2014.6830549
    BibTeX
    @inproceedings{Gencturk2014,
     author = {Gencturk, Beste and Nabiyev, Vasif and Ulutas, Guzin and Ulutas, Mustafa},
     title = {A Hybrid Image Authentication Method Robust to JPEG Attacks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {1596--1599}}
    
  75. S.A. Gieske
    Search Optimization through JPEG Quantization Tables
    University of Amsterdam Faculty of Science, University of Amsterdam Faculty of Science, 2014
    BibTeX
    @mastersthesis{Gieske2014,
     author = {Gieske, Shanron A.},
     title = {Search Optimization through JPEG Quantization Tables},
     school = {University of Amsterdam Faculty of Science},
     year = {2014}}
    
  76. A. Gironi, M. Fontani, T. Bianchi, A. Piva & M. Barni
    A Video Forensic Technique for Detecting Frame Deletion and Insertion
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 6226-6230
    DOI: 10.1109/ICASSP.2014.6854801
    BibTeX
    @inproceedings{Gironi2014,
     author = {Gironi, A. and Fontani, M. and Bianchi, T. and Piva, A. and Barni, Mauro},
     title = {A Video Forensic Technique for Detecting Frame Deletion and Insertion},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {6226--6230}}
    
  77. F. Gisolf, P. Barens, E. Snel, A. Malgoezar, M. Vos, A. Mieremet & Z. Geradts
    Common Source Identification of Images in Large Databases
    Forensic Science International, Elsevier BV, 2014, Vol. 244, pp. 222-230
    DOI: 10.1016/j.forsciint.2014.08.034
    BibTeX
    @article{Gisolf2014,
     author = {Gisolf, Floris and Barens, Pelle and Snel, Ewald and Malgoezar, Anwar and Vos, Mark and Mieremet, Arjan and Geradts, Zeno},
     title = {Common Source Identification of Images in Large Databases},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2014},
     volume = {244},
     pages = {222--230}}
    
  78. T. Gloe, A. Fischer & M. Kirchner
    Forensic Analysis of Video File Formats
    Digital Investigation, 2014, Vol. 11, Supplement 1(0), pp. 68-76
    DOI: 10.1016/j.diin.2014.03.009
    BibTeX
    @article{Gloe2014,
     author = {Gloe, Thomas and Fischer, André and Kirchner, Matthias},
     title = {Forensic Analysis of Video File Formats},
     journal = {Digital Investigation},
     year = {2014},
     volume = {11, Supplement 1},
     number = {0},
     pages = {68--76}}
    
  79. M. Goljan & J. Fridrich
    Estimation of Lens Distortion Correction from Single Images
    Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2014
    DOI: 10.1117/12.2036804
    BibTeX
    @techreport{Goljan2014,
     author = {Goljan, Miroslav and Fridrich, Jessica},
     title = {Estimation of Lens Distortion Correction from Single Images},
     school = {Department of ECE, SUNY Binghamton, NY, USA},
     year = {2014}}
    
  80. X. Gui, X. Li, W. Qi & B. Yang
    Blind Median Filtering Detection Based on Histogram Features
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041536
    BibTeX
    @inproceedings{Gui2014,
     author = {Gui, X. and Li, X. and Qi, W. and Yang, B.},
     title = {Blind Median Filtering Detection Based on Histogram Features},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  81. W. Guicquero, M. Benetti, A. Peizerat, A. Dupret & P. Vandergheynst
    On Compensating Unknown Pixel Behaviors for Image Sensors with Embedded Processing
    Signals, Systems and Computers, 2014 48th Asilomar Conference on
    2014, pp. 933-937
    DOI: 10.1109/ACSSC.2014.7094590
    BibTeX
    @inproceedings{Guicquero2014,
     author = {Guicquero, W. and Benetti, M. and Peizerat, A. and Dupret, A. and Vandergheynst, P.},
     title = {On Compensating Unknown Pixel Behaviors for Image Sensors with Embedded Processing},
     booktitle = {Signals, Systems and Computers, 2014 48th Asilomar Conference on},
     year = {2014},
     pages = {933--937}}
    
  82. M.F. Hashmi, V. Anand & A.G. Keskar
    A Copy-move Image Forgery Detection Based on Speeded up Robust Feature Transform and Wavelet Transforms
    Computer and Communication Technology (ICCCT), 2014 International Conference on
    2014, pp. 147-152
    DOI: 10.1109/ICCCT.2014.7001483
    BibTeX
    @inproceedings{Hashmi2014,
     author = {Hashmi, M. F. and Anand, V. and Keskar, A. G.},
     title = {A Copy-move Image Forgery Detection Based on Speeded up Robust Feature Transform and Wavelet Transforms},
     booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on},
     year = {2014},
     pages = {147--152}}
    
  83. M.F. Hashmi, V. Anand & A.G. Keskar
    Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform
    AASRI Procedia, Elsevier BV, 2014, Vol. 9, pp. 84-91
    DOI: 10.1016/j.aasri.2014.09.015
    BibTeX
    @article{Hashmi2014a,
     author = {Hashmi, Mohammad Farukh and Anand, Vijay and Keskar, Avinas G.},
     title = {Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform},
     journal = {AASRI Procedia},
     publisher = {Elsevier BV},
     year = {2014},
     volume = {9},
     pages = {84--91}}
    
  84. J.-U. Hou, H.-U. Jang & H.-K. Lee
    Hue Modification Estimation Using Sensor Pattern Noise
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5287-5291
    DOI: 10.1109/ICIP.2014.7026070
    BibTeX
    @inproceedings{Hou2014,
     author = {Hou, Jong-Uk and Jang, Han-Ul and Lee, Heung-Kyu},
     title = {Hue Modification Estimation Using Sensor Pattern Noise},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5287--5291}}
    
  85. Y. Hu, C.-T. Li & Z. Lai
    Fast Source Camera Identification Using Matching Signs between Query and Reference Fingerprints
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-24
    DOI: 10.1007/s11042-014-1985-3
    BibTeX
    @article{Hu2014,
     author = {Hu, Yongjian and Li, Chang-Tsun and Lai, Zhimao},
     title = {Fast Source Camera Identification Using Matching Signs between Query and Reference Fingerprints},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--24}}
    
  86. D.-Y. Huang, T.-W. Lin, W.-C. Hu & C.-H. Chou
    Boosting Scheme for Detecting Region Duplication Forgery in Digital Images
    Pan, J.-S., Krömer, P. & Snášel, V. (ed.)
    Genetic and Evolutionary Computing
    Springer International Publishing, 2014, Vol. 238, pp. 125-133
    DOI: 10.1007/978-3-319-01796-9_13
    BibTeX
    @incollection{Huang2014,
     author = {Huang, Deng-Yuan and Lin, Ta-Wei and Hu, Wu-Chih and Chou, Chih-Hung},
     title = {Boosting Scheme for Detecting Region Duplication Forgery in Digital Images},
     booktitle = {Genetic and Evolutionary Computing},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {238},
     pages = {125--133}}
    
  87. M. Hussain, S. Qasem, G. Bebis, G. Muhammad, H. Aboalsamh & H. Mathkour
    Evaluation of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors
    International Journal on Artificial Intelligence Tools, 2014, Vol. XX(X), pp. 1-27
    BibTeX
    @article{Hussain2014a,
     author = {Hussain, Muhammad and Qasem, Sahar and Bebis, George and Muhammad, Ghulam and Aboalsamh, Hatim and Mathkour, Hassan},
     title = {Evaluation of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors},
     journal = {International Journal on Artificial Intelligence Tools},
     year = {2014},
     volume = {XX},
     number = {X},
     pages = {1--27}}
    
  88. M. Hussain, S.Q. Saleh, H. Aboalsamh, G. Muhammad & G. Bebis
    Comparison between Wld and LBP Descriptors for Non-intrusive Image Forgery Detection
    Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on
    2014, pp. 197-204
    DOI: 10.1109/INISTA.2014.6873618
    BibTeX
    @inproceedings{Hussain2014,
     author = {Hussain, Muhammad and Saleh, Sahar Q. and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George},
     title = {Comparison between Wld and LBP Descriptors for Non-intrusive Image Forgery Detection},
     booktitle = {Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on},
     year = {2014},
     pages = {197--204}}
    
  89. J. Indumathi & S.P. Amala
    State-of-the-art in Block Based Copy Move Forgery Detection
    Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)
    2014
    BibTeX
    @inproceedings{Indumathi2014,
     author = {Indumathi, J. and Amala, S. P.},
     title = {State-of-the-art in Block Based Copy Move Forgery Detection},
     booktitle = {Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)},
     year = {2014}}
    
  90. M. Iuliani, S. Rossetto, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    Image Counter-forensics Based on Feature Injection
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 902810-902810-15
    DOI: 10.1117/12.2042234
    BibTeX
    @inproceedings{Iuliani2014,
     author = {Iuliani, M. and Rossetto, S. and Bianchi, T. and De Rosa, Alessia and Piva, A. and Barni, Mauro},
     title = {Image Counter-forensics Based on Feature Injection},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {902810-902810-15}}
    
  91. B.G. Jeong & I.K. Eom
    Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients
    Proc. Int Electronics, Information and Communications (ICEIC) Conf
    2014, pp. 1-2
    DOI: 10.1109/ELINFOCOM.2014.6914358
    BibTeX
    @inproceedings{Jeong2014,
     author = {Jeong, B. G. and Eom, I. K.},
     title = {Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients},
     booktitle = {Proc. Int Electronics, Information and Communications (ICEIC) Conf},
     year = {2014},
     pages = {1--2}}
    
  92. L. Jiao & Z. Du
    Copy-paste Image Forgery Blind Detection Based on Mean Shift
    Journal of Computer Applications, 2014, Vol. 34(3), pp. 806-809
    BibTeX
    @article{Jiao2014,
     author = {Jiao, Lixin and Du, Zhenglong},
     title = {Copy-paste Image Forgery Blind Detection Based on Mean Shift},
     journal = {Journal of Computer Applications},
     year = {2014},
     volume = {34},
     number = {3},
     pages = {806--809}}
    
  93. X. Kang, J. Chen, K. Lin & P. Anjie
    A Context-adaptive Spn Predictor for Trustworthy Source Camera Identification
    EURASIP Journal on Image and Video Processing, 2014, Vol. 2014(1), pp. 19
    DOI: 10.1186/1687-5281-2014-19
    BibTeX
    @article{Kang2014,
     author = {Kang, Xiangui and Chen, Jiansheng and Lin, Kerui and Anjie, Peng},
     title = {A Context-adaptive Spn Predictor for Trustworthy Source Camera Identification},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {19}}
    
  94. H. Kato, T. Nagao, H. Fujiwara & K. Kondo
    Boundary Detection of Altered Region by Differential Features on Camera Response Function
    International Journal of Signal Processing Systems, 2014, Vol. 2(1), pp. 31-36
    BibTeX
    @article{Kato2014,
     author = {Kato, Hirokazu and Nagao, Toshiyuki and Fujiwara, Hideaki and Kondo, Katsuya},
     title = {Boundary Detection of Altered Region by Differential Features on Camera Response Function},
     journal = {International Journal of Signal Processing Systems},
     year = {2014},
     volume = {2},
     number = {1},
     pages = {31--36}}
    
  95. Y. Ke, W. Min, F. Qin & J. Shang
    Image Forgery Detection Based on Semantics
    International Journal of Hybrid Information Technology, 2014, Vol. 1(7), pp. 109-124
    DOI: 10.14257/ijhit.2014.7.1.09
    BibTeX
    @article{Ke2014,
     author = {Ke, Yongzhen and Min, Weidong and Qin, Fan and Shang, Junjun},
     title = {Image Forgery Detection Based on Semantics},
     journal = {International Journal of Hybrid Information Technology},
     year = {2014},
     volume = {1},
     number = {7},
     pages = {109--124}}
    
  96. Y. Ke, F. Qin, W. Min & G. Zhangws
    Exposing Image Forgery by Detecting Consistency of Shadow
    The Scientific World Journal, 2014, Vol. 2014
    DOI: 10.1155/2014/364501
    BibTeX
    @article{Ke2014a,
     author = {Ke, Yongzhen and Qin, Fan and Min, Weidong and Zhangws, Guiling},
     title = {Exposing Image Forgery by Detecting Consistency of Shadow},
     journal = {The Scientific World Journal},
     year = {2014},
     volume = {2014}}
    
  97. E. Kee, J.F. O'brien & H. Farid
    Exposing Photo Manipulation from Shading and Shadows
    ACM Transactions on Graphics, Association for Computing Machinery (ACM), 2014, Vol. 33(5), pp. 1-21
    DOI: 10.1145/2629646
    BibTeX
    @article{Kee2014,
     author = {Kee, Eric and O'brien, James F. and Farid, Hany},
     title = {Exposing Photo Manipulation from Shading and Shadows},
     journal = {ACM Transactions on Graphics},
     publisher = {Association for Computing Machinery (ACM)},
     year = {2014},
     volume = {33},
     number = {5},
     pages = {1--21}}
    
  98. S. Ketenci & G. Uluta&x015F
    Replication Regions Detection in Images Based on Frequency Analysis of Blocks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014a,
     author = {Ketenci, S. and Uluta&x015F, G.},
     title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     year = {2014},
     pages = {461--464}}
    
  99. S. Ketenci & G. Ulutas
    Replication Regions Detection in Images Based on Frequency Analysis of Blocks
    Signal Processing and Communications Applications Conference (SIU), 2014 22nd
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014b,
     author = {Ketenci, S. and Ulutas, G.},
     title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks},
     booktitle = {Signal Processing and Communications Applications Conference (SIU), 2014 22nd},
     year = {2014},
     pages = {461--464}}
    
  100. S. Ketenci & G. Ulutaş
    Replication Regions Detection in Images Based on Frequency Analysis of Blocks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014d,
     author = {Ketenci, S. and Ulutaş, G.},
     title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     year = {2014},
     pages = {461--464}}
    
  101. S. Ketenci, G. Ulutas & M. Ulutas
    Detection of Duplicated Regions in Images Using 1D-Fourier Transform
    Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
    2014, pp. 171-174
    BibTeX
    @inproceedings{Ketenci2014,
     author = {Ketenci, S. and Ulutas, G. and Ulutas, M.},
     title = {Detection of Duplicated Regions in Images Using 1D-Fourier Transform},
     booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on},
     year = {2014},
     pages = {171--174}}
    
  102. S.M. Khamankar & M.S. Madankar
    Exposing Digital Image Forgeries from near Duplicate Images
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 924-928
    DOI: 10.1109/CSNT.2014.190
    BibTeX
    @inproceedings{Khamankar2014,
     author = {Khamankar, S. M. and Madankar, M. S.},
     title = {Exposing Digital Image Forgeries from near Duplicate Images},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {924--928}}
    
  103. A. Kharboutly, W. Puech, G. Subsol & D. Hoa
    CT-scanner Identification Based on Sensor Noise Analysis
    Visual Information Processing (EUVIP), 2014 5th European Workshop on
    2014, pp. 1-5
    DOI: 10.1109/EUVIP.2014.7018385
    BibTeX
    @inproceedings{Kharboutly2014,
     author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.},
     title = {CT-scanner Identification Based on Sensor Noise Analysis},
     booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on},
     year = {2014},
     pages = {1--5}}
    
  104. D.-G. Kim & H.-K. Lee
    Color Laser Printer Identification Using Photographed Halftone Images
    Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)
    2014
    BibTeX
    @inproceedings{Kim2014,
     author = {Kim, Do-Guk and Lee, Heung-Kyu},
     title = {Color Laser Printer Identification Using Photographed Halftone Images},
     booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)},
     year = {2014}}
    
  105. G.-B. Lee, Y.-c. Shin, J.-h. Park & M.-j. Lee
    Low-complexity Camera Tamper Detection Based on Edge Information
    Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on
    2014, pp. 155-156
    DOI: 10.1109/ICCE-TW.2014.6904034
    BibTeX
    @inproceedings{Lee2014,
     author = {Lee, Gil-Beom and Shin, Youn-chul and Park, Joo-heon and Lee, Myeong-jin},
     title = {Low-complexity Camera Tamper Detection Based on Edge Information},
     booktitle = {Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on},
     year = {2014},
     pages = {155--156}}
    
  106. H. Lee & C. Kim
    Blurred image region detection and segmentation
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 4427-4431
    DOI: 10.1109/ICIP.2014.7025898
    BibTeX
    @inproceedings{Lee2014a,
     author = {Lee, H. and Kim, C.},
     title = {Blurred image region detection and segmentation},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {4427--4431}}
    
  107. B. Li, T.-T. Ng, X. Li, S. Tan & J. Huang
    JPEG Noises beyond the First Compression Cycle
    arXiv:1405.7571, 2014
    BibTeX
    @article{Li2014f,
     author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu},
     title = {JPEG Noises beyond the First Compression Cycle},
     journal = {arXiv:1405.7571},
     year = {2014}}
    
  108. F. Li & T. Huang
    Video Copy-move Forgery Detection and Localization Based on Structural Similarity
    Farag, A. A., Yang, J. & Jiao, F. (ed.)
    Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)
    Springer Berlin Heidelberg, 2014, Vol. 278, pp. 63-76
    DOI: 10.1007/978-3-642-41407-7_7
    BibTeX
    @incollection{Li2014,
     author = {Li, Fugui and Huang, Tianqiang},
     title = {Video Copy-move Forgery Detection and Localization Based on Structural Similarity},
     booktitle = {Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {278},
     pages = {63--76}}
    
  109. H. Li, W. Luo & J. Huang
    Anti-forensics of Double JPEG Compression with the Same Quantization Matrix
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
    DOI: 10.1007/s11042-014-1927-0
    BibTeX
    @article{Li2014c,
     author = {Li, Haodong and Luo, Weiqi and Huang, Jiwu},
     title = {Anti-forensics of Double JPEG Compression with the Same Quantization Matrix},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--16}}
    
  110. K. Li, H. Li, B. Yang, Q. Meng & S. Luo
    Detection of Image Forgery Based on Improved PCA-SIFT
    Wong, W. E. & Zhu, T. (ed.)
    Computer Engineering and Networking
    Springer International Publishing, 2014, Vol. 277, pp. 679-686
    DOI: 10.1007/978-3-319-01766-2_78
    BibTeX
    @incollection{Li2014a,
     author = {Li, Kunlun and Li, Hexin and Yang, Bo and Meng, Qi and Luo, Shangzong},
     title = {Detection of Image Forgery Based on Improved PCA-SIFT},
     booktitle = {Computer Engineering and Networking},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {277},
     pages = {679--686}}
    
  111. L. Li, S. Li, H. Zhu & X. Wu
    Detecting Copy-move Forgery under Affine Transforms for Image Forensics
    Computers & Electrical Engineering, Elsevier BV, 2014, Vol. 40(6), pp. 1951-1962
    DOI: 10.1016/j.compeleceng.2013.11.034
    BibTeX
    @article{Li2014h,
     author = {Li, Leida and Li, Shushang and Zhu, Hancheng and Wu, Xiaoyue},
     title = {Detecting Copy-move Forgery under Affine Transforms for Image Forensics},
     journal = {Computers & Electrical Engineering},
     publisher = {Elsevier BV},
     year = {2014},
     volume = {40},
     number = {6},
     pages = {1951--1962}}
    
  112. R. Li, Y. Guan & C.-T. Li
    PCA-based Denoising of Sensor Pattern Noise for Source Camera Identification
    Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on
    2014, pp. 436-440
    DOI: 10.1109/ChinaSIP.2014.6889280
    BibTeX
    @inproceedings{Li2014d,
     author = {Li, Ruizhe and Guan, Yu and Li, Chang-Tsun},
     title = {PCA-based Denoising of Sensor Pattern Noise for Source Camera Identification},
     booktitle = {Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on},
     year = {2014},
     pages = {436--440}}
    
  113. R. Li, C.-T. Li & Y. Guan
    A Reference Estimator Based on Composite Sensor Pattern Noise for Source Device Identification
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280O-90280O-7
    DOI: 10.1117/12.2038651
    BibTeX
    @inproceedings{Li2014b,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {A Reference Estimator Based on Composite Sensor Pattern Noise for Source Device Identification},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280O-90280O-7}}
    
  114. Y. Li, Y.-j. Zhou, K.-g. Yuan, Y.-c. Guo & X.-x. Niu
    Exposing Photo Manipulation with Inconsistent Perspective Geometry
    The Journal of China Universities of Posts and Telecommunications, 2014, Vol. 21(4), pp. 83-104
    DOI: 10.1016/S1005-8885(14)60320-4
    BibTeX
    @article{Li2014e,
     author = {Li, Yan and Zhou, Ya-jian and Yuan, Kai-guo and Guo, Yu-cui and Niu, Xin-xin},
     title = {Exposing Photo Manipulation with Inconsistent Perspective Geometry},
     journal = {The Journal of China Universities of Posts and Telecommunications},
     year = {2014},
     volume = {21},
     number = {4},
     pages = {83--104}}
    
  115. Z. Li, Z. Zhang & Y. Shi
    Distinguishing Computer Graphics from Photographic Images Using a Multiresolution Approach Based on Local Binary Patterns
    Security and Communication Networks, 2014
    DOI: 10.1002/sec.929
    BibTeX
    @article{Li2014g,
     author = {Li, Zhaohong and Zhang, Zhenzhen and Shi, Yunqing},
     title = {Distinguishing Computer Graphics from Photographic Images Using a Multiresolution Approach Based on Local Binary Patterns},
     journal = {Security and Communication Networks},
     year = {2014}}
    
  116. B. Liu & C.M. Pun
    HSV Based Image Forgery Detection for Copy-move Attack
    Material Science and Engeneering, 2014, Vol. 556-562, pp. 2825-2828
    DOI: 10.4028/www.scientific.net/AMM.556-562.2825
    BibTeX
    @article{Liu2014a,
     author = {Liu, Bo and Pun, Chi Man},
     title = {HSV Based Image Forgery Detection for Copy-move Attack},
     journal = {Material Science and Engeneering},
     year = {2014},
     volume = {556-562},
     pages = {2825--2828}}
    
  117. B. Liu, C.-M. Pun & X.-C. Yuan
    Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies
    The Scientific World Journal, 2014
    BibTeX
    @article{Liu2014,
     author = {Liu, Bo and Pun, C.-M. and Yuan, Xiao-Chen},
     title = {Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies},
     journal = {The Scientific World Journal},
     year = {2014}}
    
  118. F. Liu, H. Wang, L.-M. Cheng, A.T.S. Ho & S. Li
    Enhanced Perceptual Image Authentication with Tamper Localization and Self-restoration
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890128
    BibTeX
    @inproceedings{Liu2014c,
     author = {Liu, Fang and Wang, Hui and Cheng, Lee-Ming and Ho, Anthony T. S. and Li, Shujun},
     title = {Enhanced Perceptual Image Authentication with Tamper Localization and Self-restoration},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  119. J. Liu & X. Kang
    Anti-forensics of Video Frame Deletion
    paper.edu.cn, 2014
    BibTeX
    @electronic{Liu2014b,
     author = {Liu, Jingxian and Kang, Xiangui},
     title = {Anti-forensics of Video Frame Deletion},
     journal = {paper.edu.cn},
     year = {2014}}
    
  120. L. Liu, R. Ni, Y. Zhao & S. Li
    Improved SIFT-based Copy-move Detection Using Bfsn Clustering and CFA Features
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
    2014, pp. 626-629
    DOI: 10.1109/IIH-MSP.2014.162
    BibTeX
    @inproceedings{Liu2014d,
     author = {Liu, Lu and Ni, Rongrong and Zhao, Yao and Li, Siran},
     title = {Improved SIFT-based Copy-move Detection Using Bfsn Clustering and CFA Features},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on},
     year = {2014},
     pages = {626--629}}
    
  121. Y. Liu, Y. Zhao & R. Ni
    Forensics of Image Blurring and Sharpening History Based on NSCT Domain
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041728
    BibTeX
    @inproceedings{Liu2014e,
     author = {Liu, Y. and Zhao, Y. and Ni, R.},
     title = {Forensics of Image Blurring and Sharpening History Based on NSCT Domain},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  122. Y. Liu, Y. Zhao & R. Ni
    Forensics of image blurring and sharpening history based on NSCT domain
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041728
    BibTeX
    @inproceedings{Liu2014f,
     author = {Liu, Y. and Zhao, Y. and Ni, R.},
     title = {Forensics of image blurring and sharpening history based on NSCT domain},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  123. D. Luo, R. Yang & J. Huang
    Detecting double compressed AMR audio using deep learning
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2669-2673
    DOI: 10.1109/ICASSP.2014.6854084
    BibTeX
    @inproceedings{Luo2014,
     author = {Luo, D. and Yang, R. and Huang, J.},
     title = {Detecting double compressed AMR audio using deep learning},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2669--2673}}
    
  124. P. Makkena, A. Rajagopalan & G. Seetharaman
    Harnessing Motion Blur to Unveil Splicing
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIFS.2014.2302895
    BibTeX
    @article{Makkena2014,
     author = {Makkena, P. and Rajagopalan, A. and Seetharaman, G.},
     title = {Harnessing Motion Blur to Unveil Splicing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  125. P. Malviya & R. Naskar
    Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection
    Information Systems Security
    Springer, 2014
    DOI: 10.1007/978-3-319-13841-1_25
    BibTeX
    @incollection{Malviya2014,
     author = {Malviya, Pankaj and Naskar, Ruchira},
     title = {Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection},
     booktitle = {Information Systems Security},
     publisher = {Springer},
     year = {2014}}
    
  126. F. Marra, F. Roli, D. Cozzolino, C. Sansone & L. Verdoliva
    Attacking the Triangle Test in Sensor-based Camera Identification
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5307-5311
    DOI: 10.1109/ICIP.2014.7026074
    BibTeX
    @inproceedings{Marra2014,
     author = {Marra, F. and Roli, F. and Cozzolino, D. and Sansone, C. and Verdoliva, L.},
     title = {Attacking the Triangle Test in Sensor-based Camera Identification},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5307--5311}}
    
  127. F. Marturana
    Device Classification in Digital Forensics Triage
    Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, 2014
    BibTeX
    @phdthesis{Marturana2014,
     author = {Marturana, Fabio},
     title = {Device Classification in Digital Forensics Triage},
     school = {Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica},
     year = {2014}}
    
  128. A. Melloni, P. Bestagini, S. Milani, M. Tagliasacchi, A. Rocha & S. Tubaro
    Image Phylogeny through Dissimilarity Metrics Fusion
    Proc. 5th European Workshop Visual Information Processing (EUVIP)
    2014, pp. 1-6
    DOI: 10.1109/EUVIP.2014.7018370
    BibTeX
    @inproceedings{Melloni2014,
     author = {Melloni, A. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Rocha, A. and Tubaro, S.},
     title = {Image Phylogeny through Dissimilarity Metrics Fusion},
     booktitle = {Proc. 5th European Workshop Visual Information Processing (EUVIP)},
     year = {2014},
     pages = {1--6}}
    
  129. S. Milani, P. Bestagini, M. Tagliasacchi & S. Tubaro
    Demosaicing Strategy Identification Via Eigenalgorithms
    2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
    2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Institute of Electrical and Electronics Engineers (IEEE), 2014
    DOI: 10.1109/icassp.2014.6854082
    BibTeX
    @inproceedings{Milani2014,
     author = {Milani, Simone and Bestagini, Paolo and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Demosaicing Strategy Identification Via Eigenalgorithms},
     booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
     journal = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2014}}
    
  130. S. Milani, P. Bestagini, M. Tagliasacchi & S. Tubaro
    Antiforensic synthesis of motion vectors using template algorithms
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2709-2713
    DOI: 10.1109/ICASSP.2014.6854092
    BibTeX
    @inproceedings{Milani2014c,
     author = {Milani, S. and Bestagini, P. and Tagliasacchi, M. and Tubaro, S.},
     title = {Antiforensic synthesis of motion vectors using template algorithms},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2709--2713}}
    
  131. S. Milani, P. Bestagini, M. Tagliasacchi & S. Tubaro
    Demosaicing strategy identification via eigenalgorithms
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2659-2663
    DOI: 10.1109/ICASSP.2014.6854082
    BibTeX
    @inproceedings{Milani2014d,
     author = {Milani, S. and Bestagini, P. and Tagliasacchi, M. and Tubaro, S.},
     title = {Demosaicing strategy identification via eigenalgorithms},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2659--2663}}
    
  132. S. Milani, L. Cuccovillo, M. Tagliasacchi, S. Tubaro & P. Aichroth
    Video Camera Identification Using Audio-visual Features
    Visual Information Processing (EUVIP), 2014 5th European Workshop on
    2014, pp. 1-6
    DOI: 10.1109/EUVIP.2014.7018382
    BibTeX
    @inproceedings{Milani2014a,
     author = {Milani, S. and Cuccovillo, L. and Tagliasacchi, M. and Tubaro, S. and Aichroth, P.},
     title = {Video Camera Identification Using Audio-visual Features},
     booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on},
     year = {2014},
     pages = {1--6}}
    
  133. S. Milani, M. Tagliasacchi & S. Tubaro
    Discriminating Multiple JPEG Compressions Using First Digit Features
    APSIPA Transactions on Signal and Information Processing, 2014, Vol. 3
    DOI: 10.1017/atsip.2014.19
    BibTeX
    @article{Milani2014b,
     author = {Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Discriminating Multiple JPEG Compressions Using First Digit Features},
     journal = {APSIPA Transactions on Signal and Information Processing},
     year = {2014},
     volume = {3}}
    
  134. A.V. Mire, S.B. Dhok, P.D. Porey & N.J. Mistry
    Digital Forensic of JPEG Images
    Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
    2014, pp. 131-136
    DOI: 10.1109/ICSIP.2014.26
    BibTeX
    @inproceedings{Mire2014,
     author = {Mire, A. V. and Dhok, S. B. and Porey, P. D. and Mistry, N. J.},
     title = {Digital Forensic of JPEG Images},
     booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on},
     year = {2014},
     pages = {131--136}}
    
  135. M. Mishra & M.C. Adhikary
    Detection of Clones in Digital Images
    International Journal of Computer Science and Business Informatics, 2014, Vol. 9(1)
    BibTeX
    @article{Mishra2014,
     author = {Mishra, Minati and Adhikary, M. C.},
     title = {Detection of Clones in Digital Images},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2014},
     volume = {9},
     number = {1}}
    
  136. Z. Moghaddasi, H.A. Jalab & R.M. Noor
    SVD-based Image Splicing Detection
    Information Technology and Multimedia (ICIMU), 2014 International Conference on
    2014, pp. 27-30
    DOI: 10.1109/ICIMU.2014.7066598
    BibTeX
    @inproceedings{Moghaddasi2014,
     author = {Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md},
     title = {SVD-based Image Splicing Detection},
     booktitle = {Information Technology and Multimedia (ICIMU), 2014 International Conference on},
     year = {2014},
     pages = {27--30}}
    
  137. C. Moun & C. Netramai
    Localization and Building Identification in Outdoor Environment for Smartphone Using Integrated GPS and Camera
    Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf
    2014, pp. 327-332
    DOI: 10.1109/DICTAP.2014.6821705
    BibTeX
    @inproceedings{Moun2014,
     author = {Moun, C. and Netramai, C.},
     title = {Localization and Building Identification in Outdoor Environment for Smartphone Using Integrated GPS and Camera},
     booktitle = {Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf},
     year = {2014},
     pages = {327--332}}
    
  138. S. Mushtaq & A.H. Mir
    Forgery Detection Using Statistical Features
    Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of
    2014, pp. 92-97
    DOI: 10.1109/CIPECH.2014.7019062
    BibTeX
    @inproceedings{Mushtaq2014,
     author = {Mushtaq, S. and Mir, A. H.},
     title = {Forgery Detection Using Statistical Features},
     booktitle = {Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of},
     year = {2014},
     pages = {92--97}}
    
  139. S. Mushtaq & A.H. Mir
    Novel Method for Image Splicing Detection
    Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on
    2014, pp. 2398-2403
    DOI: 10.1109/ICACCI.2014.6968386
    BibTeX
    @inproceedings{Mushtaq2014a,
     author = {Mushtaq, S. and Mir, A. H.},
     title = {Novel Method for Image Splicing Detection},
     booktitle = {Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on},
     year = {2014},
     pages = {2398--2403}}
    
  140. H.U. Neenu & J. Cheriyan
    Image Forgery Detection Based on Illumination Inconsistencies & Intrinsic Resampling Properties
    Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on
    2014, pp. 1-6
    DOI: 10.1109/AICERA.2014.6908192
    BibTeX
    @inproceedings{Neenu2014,
     author = {Neenu, H. U. and Cheriyan, J.},
     title = {Image Forgery Detection Based on Illumination Inconsistencies & Intrinsic Resampling Properties},
     booktitle = {Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on},
     year = {2014},
     pages = {1--6}}
    
  141. A. Ng, L. Pan & Y. Xiang
    A Novel Method for Detecting Double Compressed Facebook JPEG Images
    Batten, L., Li, G., Niu, W. & Warren, M. (ed.)
    Applications and Techniques in Information Security
    Springer Science mathplus Business Media, 2014, Vol. 490, pp. 191-198
    DOI: 10.1007/978-3-662-45670-5_18
    BibTeX
    @incollection{Ng2014,
     author = {Ng, Allan and Pan, Lei and Xiang, Yang},
     title = {A Novel Method for Detecting Double Compressed Facebook JPEG Images},
     booktitle = {Applications and Techniques in Information Security},
     publisher = {Springer Science mathplus Business Media},
     year = {2014},
     volume = {490},
     pages = {191--198}}
    
  142. C. Nothelle
    Vorsicht Falle! Scripted Reality, Retouchierte Fotos, Pseudonyme -- Täuschung Als Medienethische Herausforderung
    Communicatio Socialis, 2014, Vol. 46(3-4)
    BibTeX
    @article{Nothelle2014,
     author = {Nothelle, Claudia},
     title = {Vorsicht Falle! Scripted Reality, Retouchierte Fotos, Pseudonyme -- Täuschung Als Medienethische Herausforderung},
     journal = {Communicatio Socialis},
     year = {2014},
     volume = {46},
     number = {3--4}}
    
  143. F. de O. Costa, M.A. Oikawa, Z. Dias, S. Goldenstein & A.R. de Rocha
    Image Phylogeny Forests Reconstruction
    IEEE Transactions on Information Forensics and Security, 2014, Vol. 9(10), pp. 1533-1546
    DOI: 10.1109/TIFS.2014.2340017
    BibTeX
    @article{O.Costa2014,
     author = {de O. Costa, F. and Oikawa, M. A. and Dias, Z. and Goldenstein, S. and de Rocha, A. R.},
     title = {Image Phylogeny Forests Reconstruction},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2014},
     volume = {9},
     number = {10},
     pages = {1533--1546}}
    
  144. S. Orozco, AnaLucila, A. González, DavidManuel, G. Villalba, L. Javier & J. Hernández-Castro
    Analysis of Errors in EXIF Metadata on Mobile Devices
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-29
    DOI: 10.1007/s11042-013-1837-6
    BibTeX
    @article{Orozco2014,
     author = {Orozco, Sandoval and AnaLucila and González, Arenas and DavidManuel and Villalba, García and Javier, Luis and Hernández-Castro, Julio},
     title = {Analysis of Errors in EXIF Metadata on Mobile Devices},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--29}}
    
  145. D. Pande
    Towards Detection of Image Tampering Over Diverse Information Security Schemata: A State of the art
    International Journal of Information and Network Security (IJINS), 2014, Vol. 3(1)
    BibTeX
    @article{Pande2014,
     author = {Pande, Deepali},
     title = {Towards Detection of Image Tampering Over Diverse Information Security Schemata: A State of the art},
     journal = {International Journal of Information and Network Security (IJINS)},
     year = {2014},
     volume = {3},
     number = {1}}
    
  146. R.C. Pandey, S.K. Singh & K.K. Shukla
    Passive Copy-move Forgery Detection in Videos
    Computer and Communication Technology (ICCCT), 2014 International Conference on
    2014, pp. 301-306
    DOI: 10.1109/ICCCT.2014.7001509
    BibTeX
    @inproceedings{Pandey2014a,
     author = {Pandey, R. C. and Singh, S. K. and Shukla, K. K.},
     title = {Passive Copy-move Forgery Detection in Videos},
     booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on},
     year = {2014},
     pages = {301--306}}
    
  147. R.C. Pandey, S.K. Singh, K.K. Shukla & R. Agrawal
    Fast and Robust Passive Copy-move Forgery Detection Using SURF and SIFT Image Features
    Industrial and Information Systems (ICIIS), 2014 9th International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICIINFS.2014.7036519
    BibTeX
    @inproceedings{Pandey2014,
     author = {Pandey, Ramesh Chand and Singh, Sanjay Kumar and Shukla, K. K. and Agrawal, Rishabh},
     title = {Fast and Robust Passive Copy-move Forgery Detection Using SURF and SIFT Image Features},
     booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on},
     year = {2014},
     pages = {1--6}}
    
  148. C. Pasquini, G. Boato & F. Perez-Gonzalez
    Multiple JPEG compression detection by means of Benford-Fourier coefficients
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2014, pp. 113-118
    DOI: 10.1109/WIFS.2014.7084313
    BibTeX
    @inproceedings{Pasquini2014b,
     author = {Pasquini, C. and Boato, G. and Perez-Gonzalez, F.},
     title = {Multiple JPEG compression detection by means of Benford-Fourier coefficients},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2014},
     pages = {113--118}}
    
  149. C. Pasquini, P. Comesaña-Alfaro, F. Pérez-González & G. Boato
    Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2699-2703
    DOI: 10.1109/ICASSP.2014.6854090
    BibTeX
    @inproceedings{Pasquini2014a,
     author = {Pasquini, C. and Comesaña-Alfaro, P. and Pérez-González, F. and Boato, G.},
     title = {Transportation-theoretic image counterforensics to First Significant Digit histogram forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2699--2703}}
    
  150. C. Pasquini, P. Comesaña-Alfaro, F. Pérez-González & G. Boato
    Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2699-2703
    DOI: 10.1109/ICASSP.2014.6854090
    BibTeX
    @inproceedings{Pasquini2014c,
     author = {Pasquini, C. and Comesaña-Alfaro, P. and Pérez-González, F. and Boato, G.},
     title = {Transportation-theoretic image counterforensics to First Significant Digit histogram forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2699--2703}}
    
  151. C. Pasquini, F. Pérez-González & G. Boato
    A Benford-Fourier JPEG compression detector
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5322-5326
    DOI: 10.1109/ICIP.2014.7026077
    BibTeX
    @inproceedings{Pasquini2014,
     author = {Pasquini, C. and Pérez-González, F. and Boato, G.},
     title = {A Benford-Fourier JPEG compression detector},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5322--5326}}
    
  152. A. Peng & X. Kang
    A Robust Median Filtering Detector Based on Filter Residual
    paper.edu.cn, 2014
    BibTeX
    @electronic{Peng2014a,
     author = {Peng, Anjie and Kang, Xiangui},
     title = {A Robust Median Filtering Detector Based on Filter Residual},
     journal = {paper.edu.cn},
     year = {2014}}
    
  153. F. Peng, J. Shi & M. Long
    Identifying Photographic Images and Photorealistic Computer Graphics Using Multifractal Spectrum Features of PRNU
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890296
    BibTeX
    @inproceedings{Peng2014b,
     author = {Peng, Fei and Shi, Jiaoling and Long, Min},
     title = {Identifying Photographic Images and Photorealistic Computer Graphics Using Multifractal Spectrum Features of PRNU},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  154. F. Peng & D.-l. Zhou
    Discriminating Natural Images and Computer Generated Graphics Based on the Impact of CFA Interpolation on the Correlation of PRNU
    Digital Investigation, 2014(0), pp. -
    DOI: 10.1016/j.diin.2014.04.002
    BibTeX
    @article{Peng2014,
     author = {Peng, Fei and Zhou, Die-lan},
     title = {Discriminating Natural Images and Computer Generated Graphics Based on the Impact of CFA Interpolation on the Correlation of PRNU},
     journal = {Digital Investigation},
     year = {2014},
     number = {0},
     pages = {-}}
    
  155. H.S.D. Perera
    Video Analysis Tool Box for Digital Video Forensics
    University of Moratuwa, University of Moratuwa, 2014
    BibTeX
    @phdthesis{Perer2014,
     author = {Perera, Halloluwage Susinda Deemantha},
     title = {Video Analysis Tool Box for Digital Video Forensics},
     school = {University of Moratuwa},
     year = {2014}}
    
  156. Z. Qian & X. Zhang
    Improved Anti-forensics of JPEG\ Compression
    Journal of Systems and Software, 2014(0), pp. -
    DOI: 10.1016/j.jss.2013.12.043
    BibTeX
    @article{Qian2014,
     author = {Qian, Zhenxing and Zhang, Xinpeng},
     title = {Improved Anti-forensics of JPEG\ Compression},
     journal = {Journal of Systems and Software},
     year = {2014},
     number = {0},
     pages = {-}}
    
  157. X. Qiu, H. Li, W. Luo & J. Huang
    A Universal Image Forensic Strategy Based on Steganalytic Model
    Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security
    ACM, 2014, pp. 165-170
    DOI: 10.1145/2600918.2600941
    BibTeX
    @inproceedings{Qiu2014,
     author = {Qiu, Xiaoqing and Li, Haodong and Luo, Weiqi and Huang, Jiwu},
     title = {A Universal Image Forensic Strategy Based on Steganalytic Model},
     booktitle = {Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security},
     publisher = {ACM},
     year = {2014},
     pages = {165--170}}
    
  158. Z. Qu, W. Luo & J. Huang
    A Framework for Identifying Shifted Double JPEG Compression Artifacts with Application to Non-intrusive Digital Image Forensics
    Science China Information Sciences, Science China Press, 2014, Vol. 57(2), pp. 1-18
    DOI: 10.1007/s11432-013-5046-8
    BibTeX
    @article{Qu2014,
     author = {Qu, ZhenHua and Luo, WeiQi and Huang, JiWu},
     title = {A Framework for Identifying Shifted Double JPEG Compression Artifacts with Application to Non-intrusive Digital Image Forensics},
     journal = {Science China Information Sciences},
     publisher = {Science China Press},
     year = {2014},
     volume = {57},
     number = {2},
     pages = {1--18}}
    
  159. M.A. Qureshi & M. Deriche
    A Review on Copy Move Image Forgery Detection Techniques
    Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf
    2014, pp. 1-5
    DOI: 10.1109/SSD.2014.6808907
    BibTeX
    @inproceedings{Qureshi2014,
     author = {Qureshi, M. Ali and Deriche, M.},
     title = {A Review on Copy Move Image Forgery Detection Techniques},
     booktitle = {Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf},
     year = {2014},
     pages = {1--5}}
    
  160. M.P. Rao, A.N. Rajagopalan & G. Seetharaman
    Harnessing Motion Blur to Unveil Splicing
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(4), pp. 583-595
    DOI: 10.1109/TIFS.2014.2302895
    BibTeX
    @article{Rao2014,
     author = {Rao, M. P. and Rajagopalan, A. N. and Seetharaman, G.},
     title = {Harnessing Motion Blur to Unveil Splicing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {4},
     pages = {583--595}}
    
  161. C. Richao, Y. Gaobo & Z. Ningbo
    Detection of Object-based Manipulation by the Statistical Features of Object Contour
    Forensic Science International, 2014
    BibTeX
    @article{Richao2014,
     author = {Richao, Chen and Gaobo, Yang and Ningbo, Zhu},
     title = {Detection of Object-based Manipulation by the Statistical Features of Object Contour},
     journal = {Forensic Science International},
     year = {2014}}
    
  162. S.-J. Ryu & H.-K. Lee
    Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation
    Pattern Recognition Letters, 2014, Vol. 36(0), pp. 89-99
    DOI: 10.1016/j.patrec.2013.09.028
    BibTeX
    @article{Ryu2014,
     author = {Ryu, Seung-Jin and Lee, Heung-Kyu},
     title = {Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation},
     journal = {Pattern Recognition Letters},
     year = {2014},
     volume = {36},
     number = {0},
     pages = {89--99}}
    
  163. S.-J. Ryu, H.-Y. Lee & H.-k. Lee
    Detecting Trace of Seam Carving for Forensic Analysis
    IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(5), pp. 1304-1311
    BibTeX
    @article{Ryu2014a,
     author = {Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-kyu},
     title = {Detecting Trace of Seam Carving for Forensic Analysis},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2014},
     volume = {E97-D},
     number = {5},
     pages = {1304--1311}}
    
  164. M. Saleem
    A Key-point Based Robust Algorithm for Detecting Cloning Forgery
    International Journal of Current Engineering and Technology, 2014
    BibTeX
    @article{Saleem2014,
     author = {Saleem, Mariam},
     title = {A Key-point Based Robust Algorithm for Detecting Cloning Forgery},
     journal = {International Journal of Current Engineering and Technology},
     year = {2014}}
    
  165. M. Saleem, M.Q. Altaf & Q. Chaudry
    A Comparative Analysis on Pixel-based Blind Cloning Techniques
    Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on
    2014, pp. 130-135
    DOI: 10.1109/ICCSCE.2014.7072702
    BibTeX
    @inproceedings{Saleem2014a,
     author = {Saleem, M. and Altaf, M. Q. and Chaudry, Q.},
     title = {A Comparative Analysis on Pixel-based Blind Cloning Techniques},
     booktitle = {Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on},
     year = {2014},
     pages = {130--135}}
    
  166. A.L. Sandoval Orozco, D.M. Arenas González, J. Rosales Corripio, L.J. García Villalba & J.C. Hernandez-Castro
    Source Identification for Mobile Devices, Based on Wavelet Transforms Combined with Sensor Imperfections
    Computing, Springer, 2014, Vol. 96(9), pp. 829
    DOI: 10.1007/s00607-013-0313-5
    BibTeX
    @article{SandovalOrozco2014,
     author = {Sandoval Orozco, A. L. and Arenas González, D. M. and Rosales Corripio, J. and García Villalba, L. J. and Hernandez-Castro, J. C.},
     title = {Source Identification for Mobile Devices, Based on Wavelet Transforms Combined with Sensor Imperfections},
     journal = {Computing},
     publisher = {Springer},
     year = {2014},
     volume = {96},
     number = {9},
     pages = {829}}
    
  167. T.K. Sarode & N. Vaswani
    Copy-move Forgery Detection Using Orthogonal Wavelet Transforms.
    International Journal of Computer Applications, 2014, Vol. 88, pp. 41-45
    BibTeX
    @article{Sarode2014,
     author = {Sarode, Tanuja K. and Vaswani, Naveen},
     title = {Copy-move Forgery Detection Using Orthogonal Wavelet Transforms.},
     journal = {International Journal of Computer Applications},
     year = {2014},
     volume = {88},
     pages = {41--45}}
    
  168. R. Satta & P. Stirparo
    On the Usage of Sensor Pattern Noise for Picture-to-identity Linking through Social Network Accounts
    Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal
    2014
    BibTeX
    @inproceedings{Satta2014,
     author = {Satta, Riccardo and Stirparo, Pasquale},
     title = {On the Usage of Sensor Pattern Noise for Picture-to-identity Linking through Social Network Accounts},
     booktitle = {Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal},
     year = {2014}}
    
  169. S. Shang, N. Memon & X. Kong
    Detecting Documents Forged by Printing and Copying
    EURASIP Journal on Advances in Signal Processing, Springer, 2014, Vol. 2014(1), pp. 140
    BibTeX
    @article{Shang2014,
     author = {Shang, Shize and Memon, Nasir and Kong, Xiangwei},
     title = {Detecting Documents Forged by Printing and Copying},
     journal = {EURASIP Journal on Advances in Signal Processing},
     publisher = {Springer},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {140}}
    
  170. N. Shaozhang, M. Xianzhe & C. Haoliang
    Digital Image Forensics Using Orthogonal 1-D Objects
    Chinese Journal of Electronics, 2014, Vol. 23(3)
    BibTeX
    @article{Shaozhang201,
     author = {Shaozhang, Niu and Xianzhe, Meng and Haoliang, Cui},
     title = {Digital Image Forensics Using Orthogonal 1-D Objects},
     journal = {Chinese Journal of Electronics},
     year = {2014},
     volume = {23},
     number = {3}}
    
  171. K. Sharma
    Computationally Efficient Copy-move Image Forgery Detection Based on DCT and SVD
    Advanced Research in Electrical and Electronic Engineering, 2014, Vol. 1(3), pp. 79-81
    BibTeX
    @article{Sharma2014,
     author = {Sharma, Kavya},
     title = {Computationally Efficient Copy-move Image Forgery Detection Based on DCT and SVD},
     journal = {Advanced Research in Electrical and Electronic Engineering},
     year = {2014},
     volume = {1},
     number = {3},
     pages = {79--81}}
    
  172. Shehnaz & M. Kaur
    Forgery Detection Based on Blur Inconsistencies: A Review
    International Journal of Engineering and Technical Research (IJETR), 2014, Vol. 2(12), pp. 198-201
    BibTeX
    @article{Shehnaz2014,
     author = {Shehnaz and Kaur, Mandeep},
     title = {Forgery Detection Based on Blur Inconsistencies: A Review},
     journal = {International Journal of Engineering and Technical Research (IJETR)},
     year = {2014},
     volume = {2},
     number = {12},
     pages = {198--201}}
    
  173. Z. Shen, J. Ni & C. Chen
    Blind Detection of Median Filtering Using Linear and Nonlinear Descriptors
    Multimedia Tools and Applications, Springer, 2014, pp. 1
    DOI: 10.1007/s11042-014-2407-2
    BibTeX
    @article{Shen2014,
     author = {Shen, Zhaoyi and Ni, Jiangqun and Chen, Chenglong},
     title = {Blind Detection of Median Filtering Using Linear and Nonlinear Descriptors},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2014},
     pages = {1}}
    
  174. C. Shi, N.-F. Law, H.-F. Leung & W.-C. Siu
    Weighting Optimization with Neural Network for Photo-response-non-uniformity-based Source Camera Identification
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-7
    DOI: 10.1109/APSIPA.2014.7041642
    BibTeX
    @inproceedings{Shi2014,
     author = {Shi, Chao and Law, Ngai-Fong and Leung, Hung-Fat and Siu, Wan-Chi},
     title = {Weighting Optimization with Neural Network for Photo-response-non-uniformity-based Source Camera Identification},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--7}}
    
  175. Y.-D. Shin
    Forgery Image Detection of Scale up and down Image Using Discrete Cosine Transform
    Journal of Next Generation Information Technology (JNIT), 2014, Vol. 5(2)
    BibTeX
    @article{Shin2014,
     author = {Shin, Yong-Dal},
     title = {Forgery Image Detection of Scale up and down Image Using Discrete Cosine Transform},
     journal = {Journal of Next Generation Information Technology (JNIT)},
     year = {2014},
     volume = {5},
     number = {2}}
    
  176. C. Song & X. Lin
    Natural Image Splicing Detection Based on Defocus Blur at Edges
    Communications in China (ICCC), 2014 IEEE/CIC International Conference on
    2014, pp. 225-230
    DOI: 10.1109/ICCChina.2014.7008276
    BibTeX
    @inproceedings{Song2014,
     author = {Song, Chunhe and Lin, Xiaodong},
     title = {Natural Image Splicing Detection Based on Defocus Blur at Edges},
     booktitle = {Communications in China (ICCC), 2014 IEEE/CIC International Conference on},
     year = {2014},
     pages = {225--230}}
    
  177. B. Su, Q. Yuan, S. Wang, C. Zhao & S. Li
    Enhanced State Selection Markov Model for Image Splicing Detection
    EURASIP Journal on Wireless Communications and Networking, 2014, Vol. 2014(1), pp. 7
    DOI: 10.1186/1687-1499-2014-7
    BibTeX
    @article{Su2014,
     author = {Su, Bo and Yuan, Quanqiao and Wang, Shilin and Zhao, Chenglin and Li, Shenghong},
     title = {Enhanced State Selection Markov Model for Image Splicing Detection},
     journal = {EURASIP Journal on Wireless Communications and Networking},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {7}}
    
  178. L. Su, T. Huang & J. Yang
    A Video Forgery Detection Algorithm Based on Compressive Sensing
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
    DOI: 10.1007/s11042-014-1915-4
    BibTeX
    @article{Su2014a,
     author = {Su, Lichao and Huang, Tianqiang and Yang, Jianmei},
     title = {A Video Forgery Detection Algorithm Based on Compressive Sensing},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--16}}
    
  179. K. Sudhakar, V.M. Sandeep & S. Kulkarni
    Speeding-up SIFT Based Copy Move Forgery Detection Using Level Set Approach
    Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICAECC.2014.7002407
    BibTeX
    @inproceedings{Sudhakar2014,
     author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.},
     title = {Speeding-up SIFT Based Copy Move Forgery Detection Using Level Set Approach},
     booktitle = {Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on},
     year = {2014},
     pages = {1--6}}
    
  180. K. Sudhakar, V.M. Sandeep & S. Kulkarni
    Shape Based Copy Move Forgery Detection Using Level Set Approach
    Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
    2014, pp. 213-217
    DOI: 10.1109/ICSIP.2014.40
    BibTeX
    @inproceedings{Sudhakar2014a,
     author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.},
     title = {Shape Based Copy Move Forgery Detection Using Level Set Approach},
     booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on},
     year = {2014},
     pages = {213--217}}
    
  181. R. Sumner
    Processing Raw Images in Matlab
    Department of Electrical Engineering, UC Santa Cruz, Department of Electrical Engineering, UC Santa Cruz, 2014
    BibTeX
    @other{Sumner2014,
     author = {Sumner, Rob},
     title = {Processing Raw Images in Matlab},
     school = {Department of Electrical Engineering, UC Santa Cruz},
     year = {2014}}
    
  182. K. Sunil, D. Jagan & M. Shaktidev
    DCT-PCA Based Method for Copy-move Forgery Detection
    Satapathy, S. C., Avadhani, P. S., Udgata, S. K. & Lakshminarayana, S. (ed.)
    ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II
    Springer International Publishing, 2014, Vol. 249, pp. 577-583
    DOI: 10.1007/978-3-319-03095-1_62
    BibTeX
    @incollection{Sunil2014,
     author = {Sunil, Kumar and Jagan, Desai and Shaktidev, Mukherjee},
     title = {DCT-PCA Based Method for Copy-move Forgery Detection},
     booktitle = {ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {249},
     pages = {577--583}}
    
  183. T.H. Tai
    Statistical Modeling and Detection for Digital Image Forensics
    University of Technology of Troyes, University of Technology of Troyes, 2014
    BibTeX
    @phdthesis{Tai2014,
     author = {Tai, Than Hai},
     title = {Statistical Modeling and Detection for Digital Image Forensics},
     school = {University of Technology of Troyes},
     year = {2014}}
    
  184. T.H. Thai, R. Cogranne & F. Retraint
    Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coefficients
    Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop
    2014, pp. 1-6
    DOI: 10.1109/MMSP.2014.6958810
    BibTeX
    @inproceedings{Thai2014,
     author = {Thai, Thanh Hai and Cogranne, R. and Retraint, F.},
     title = {Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coefficients},
     booktitle = {Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop},
     year = {2014},
     pages = {1--6}}
    
  185. T.H. Thai, R. Cogranne & F. Retraint
    Camera Model Identification Based on the Heteroscedastic Noise Model
    IEEE Transactions on Image Processing, 2014, Vol. 23(1), pp. 250-263
    DOI: 10.1109/TIP.2013.2290596
    BibTeX
    @article{Thai2014b,
     author = {Thai, T. H. and Cogranne, R. and Retraint, F.},
     title = {Camera Model Identification Based on the Heteroscedastic Noise Model},
     journal = {IEEE Transactions on Image Processing},
     year = {2014},
     volume = {23},
     number = {1},
     pages = {250--263}}
    
  186. T. Thongkamwitoon, H. Muammar & P.L. Dragotti
    Robust Image Recapture Detection Using a K-SVD Learning Approach to Train Dictionaries of Edge Profiles
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5317-5321
    DOI: 10.1109/ICIP.2014.7026076
    BibTeX
    @inproceedings{Thongkamwitoon2014,
     author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.},
     title = {Robust Image Recapture Detection Using a K-SVD Learning Approach to Train Dictionaries of Edge Profiles},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5317--5321}}
    
  187. D. Tralic, S. Grgic & B. Zovko-Cihlar
    Video Frame Copy-move Forgery Detection Based on Cellular Automata and Local Binary Patterns
    Telecommunications (BIHTEL), 2014 X International Symposium on
    2014, pp. 1-4
    DOI: 10.1109/BIHTEL.2014.6987651
    BibTeX
    @inproceedings{Tralic2014a,
     author = {Tralic, D. and Grgic, S. and Zovko-Cihlar, B.},
     title = {Video Frame Copy-move Forgery Detection Based on Cellular Automata and Local Binary Patterns},
     booktitle = {Telecommunications (BIHTEL), 2014 X International Symposium on},
     year = {2014},
     pages = {1--4}}
    
  188. D. Tralic, P. Rosin, X. Sun & S. Grgic
    Copy-move Forgery Detection Using Cellular Automata
    Rosin, P., Adamatzky, A. & Sun, X. (ed.)
    Cellular Automata in Image Processing and Geometry
    Chapter Copy-Move Forgery Detection Using Cellular Automata
    Springer, 2014, pp. 105-125
    DOI: 10.1007/978-3-319-06431-4_6
    BibTeX
    @inbook{Tralic2014,
     author = {Tralic, Dijana and Rosin, Paul and Sun, Xianfang and Grgic, Sonja},
     title = {Copy-move Forgery Detection Using Cellular Automata},
     booktitle = {Cellular Automata in Image Processing and Geometry},
     publisher = {Springer},
     year = {2014},
     pages = {105--125}}
    
  189. D. Tralic, P.L. Rosin, X. Sun & S. Grgic
    Detection of Duplicated Image Regions Using Cellular Automata
    Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
    2014, pp. 167-170
    BibTeX
    @inproceedings{Tralic2014b,
     author = {Tralic, D. and Rosin, P. L. and Sun, Xianfang and Grgic, S.},
     title = {Detection of Duplicated Image Regions Using Cellular Automata},
     booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on},
     year = {2014},
     pages = {167--170}}
    
  190. D.T. Trung, A. Beghdadi & M.-C. Larabi
    Blind Inpainting Forgery Detection
    Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on
    2014, pp. 1019-1023
    DOI: 10.1109/GlobalSIP.2014.7032275
    BibTeX
    @inproceedings{Trung2014,
     author = {Trung, Dang Thanh and Beghdadi, A. and Larabi, M.-C.},
     title = {Blind Inpainting Forgery Detection},
     booktitle = {Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on},
     year = {2014},
     pages = {1019--1023}}
    
  191. G. Valenzise, M. Tagliasacchi & S. Tubaro
    Detectability-quality Trade-off in JPEG Counter-forensics
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5337-5341
    DOI: 10.1109/ICIP.2014.7026080
    BibTeX
    @inproceedings{Valenzise2014,
     author = {Valenzise, G. and Tagliasacchi, M. and Tubaro, S.},
     title = {Detectability-quality Trade-off in JPEG Counter-forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5337--5341}}
    
  192. G. Valenzise, M. Tagliasacchi & S. Tubaro
    Detectability-quality trade-off in JPEG counter-forensics
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5337-5341
    DOI: 10.1109/ICIP.2014.7026080
    BibTeX
    @inproceedings{Valenzise2014a,
     author = {Valenzise, G. and Tagliasacchi, M. and Tubaro, S.},
     title = {Detectability-quality trade-off in JPEG counter-forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5337--5341}}
    
  193. L. Verdoliva, D. Cozzolino & G. Poggi
    A Feature-based Approach for Image Tampering Detection and Localization
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 149-154
    DOI: 10.1109/WIFS.2014.7084319
    BibTeX
    @inproceedings{Verdoliva2014,
     author = {Verdoliva, L. and Cozzolino, D. and Poggi, G.},
     title = {A Feature-based Approach for Image Tampering Detection and Localization},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {149--154}}
    
  194. K.A. Vladimirovich & M.V. Valerievich
    A Fast Plain Copy-move Detection Algorithm Based on Structural Pattern and 2d Rabin-karp Rolling Hash
    Image Analysis and Recognition, Springer, 2014
    DOI: 10.1007/978-3-319-11758-4_50
    BibTeX
    @article{Vladimirovich2014,
     author = {Vladimirovich, Kuznetsov Andrey and Valerievich, Myasnikov Vladislav},
     title = {A Fast Plain Copy-move Detection Algorithm Based on Structural Pattern and 2d Rabin-karp Rolling Hash},
     journal = {Image Analysis and Recognition},
     publisher = {Springer},
     year = {2014}}
    
  195. A.W.A. Wahab, M.A. Bagiwa, M.Y.I. Idris, S. Khan, Z. Razak & M.R.K. Ariffin
    Passive Video Forgery Detection Techniques: A Survey
    Information Assurance and Security (IAS), 2014 10th International Conference on
    2014, pp. 29-34
    DOI: 10.1109/ISIAS.2014.7064616
    BibTeX
    @inproceedings{Wahab2014,
     author = {Wahab, Ainuddin Wahid Abdul and Bagiwa, Mustapha Aminu and Idris, Mohd Yamani Idna and Khan, Suleman and Razak, Zaidi and Ariffin, Muhammad Rezal Kamel},
     title = {Passive Video Forgery Detection Techniques: A Survey},
     booktitle = {Information Assurance and Security (IAS), 2014 10th International Conference on},
     year = {2014},
     pages = {29--34}}
    
  196. M. Wang, Z. Chen, W. Fan & Z. Xiong
    Countering anti-forensics to wavelet-based compression
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5382-5386
    DOI: 10.1109/ICIP.2014.7026089
    BibTeX
    @inproceedings{Wang2014c,
     author = {Wang, M. and Chen, Z. and Fan, W. and Xiong, Z.},
     title = {Countering anti-forensics to wavelet-based compression},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5382--5386}}
    
  197. S.-L. Wang, A.W.-C. Liew, S.-H. Li, Y.-J. Zhang & J.-H. Li
    Detection of Shifted Double JPEG Compression by an Adaptive DCT Coefficient Model
    EURASIP Journal on Advances in Signal Processing, 2014, Vol. 2014(1), pp. 101
    DOI: 10.1186/1687-6180-2014-101
    BibTeX
    @article{Wang2014,
     author = {Wang, Shi-Lin and Liew, Alan Wee-Chung and Li, Sheng-Hong and Zhang, Yu-Jin and Li, Jian-Hua},
     title = {Detection of Shifted Double JPEG Compression by an Adaptive DCT Coefficient Model},
     journal = {EURASIP Journal on Advances in Signal Processing},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {101}}
    
  198. W. Wang, J. Dong & T. Tan
    Exploring DCT Coefficient Quantization Effects for Local Tampering Detection
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(10), pp. 1653-1666
    DOI: 10.1109/TIFS.2014.2345479
    BibTeX
    @article{Wang2014a,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Exploring DCT Coefficient Quantization Effects for Local Tampering Detection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {10},
     pages = {1653--1666}}
    
  199. W. Wang, X. Jiang, S. Wang, M. Wan & T. Sun
    Identifying Video Forgery Process Using Optical Flow
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_18
    BibTeX
    @article{Wang2014b,
     author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Wan, Meng and Sun, Tanfeng},
     title = {Identifying Video Forgery Process Using Optical Flow},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  200. J.-D. Wei, Y.-J. Lin & Y.-J. Wu
    A Patch Analysis Method to Detect Seam Carved Images
    Pattern Recognition Letters, 2014, Vol. 36(0), pp. 100-106
    DOI: 10.1016/j.patrec.2013.09.026
    BibTeX
    @article{Wei2014,
     author = {Wei, Jyh-Da and Lin, Yu-Ju and Wu, Yi-Jing},
     title = {A Patch Analysis Method to Detect Seam Carved Images},
     journal = {Pattern Recognition Letters},
     year = {2014},
     volume = {36},
     number = {0},
     pages = {100--106}}
    
  201. Y. Wu, Y. Deng, H. Duan & L. Zhou
    Dual Tree Complex Wavelet Transform Approach to Copy-rotate-move Forgery Detection
    Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(1), pp. 1-12
    DOI: 10.1007/s11432-013-4823-8
    BibTeX
    @article{Wu2014,
     author = {Wu, YunJie and Deng, Yu and Duan, HaiBin and Zhou, LinNa},
     title = {Dual Tree Complex Wavelet Transform Approach to Copy-rotate-move Forgery Detection},
     journal = {Science China Information Sciences},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {57},
     number = {1},
     pages = {1--12}}
    
  202. Y. Wu, X. Jiang, T. Sun & W. Wang
    Exposing video inter-frame forgery based on velocity field consistency
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2674-2678
    DOI: 10.1109/ICASSP.2014.6854085
    BibTeX
    @inproceedings{Wu2014a,
     author = {Wu, Y. and Jiang, X. and Sun, T. and Wang, W.},
     title = {Exposing video inter-frame forgery based on velocity field consistency},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2674--2678}}
    
  203. Y. Xiao
    Image Splicing Detection Based on Machine Learning Algorithm
    Wong, W. E. & Zhu, T. (ed.)
    Computer Engineering and Networking
    Springer International Publishing, 2014, Vol. 277, pp. 601-608
    DOI: 10.1007/978-3-319-01766-2_69
    BibTeX
    @incollection{Xiao2014,
     author = {Xiao, Yan},
     title = {Image Splicing Detection Based on Machine Learning Algorithm},
     booktitle = {Computer Engineering and Networking},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {277},
     pages = {601--608}}
    
  204. N. Xing, J. Wang, X. Zhang & J. Zhang
    Digital Image Identification Based on Generalized Gaussian Model
    Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014
    Proc. SPIE, 2014, Vol. 9233, pp. 923303-923303-6
    DOI: 10.1117/12.2069695
    BibTeX
    @inproceedings{Xing2014,
     author = {Xing, Nan and Wang, Jing and Zhang, Xiaolei and Zhang, Jingbo},
     title = {Digital Image Identification Based on Generalized Gaussian Model},
     booktitle = {Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9233},
     pages = {923303-923303-6}}
    
  205. B. Xu, G. Liu & Y. Dai
    Detecting Image Splicing Using Merged Features in Chroma Space
    The Scientific World Journal, 2014, Vol. 2014
    DOI: 10.1155/2014/262356
    BibTeX
    @article{Xu2014,
     author = {Xu, Bo and Liu, Guangjie and Dai, Yuewei},
     title = {Detecting Image Splicing Using Merged Features in Chroma Space},
     journal = {The Scientific World Journal},
     year = {2014},
     volume = {2014}}
    
  206. B. Yang & B. Liu
    Feature Fusion for Blurring Detection in Image Forensics
    IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(6), pp. 1690-1693
    BibTeX
    @article{Yang2014a,
     author = {Yang, Benjuan and Liu, Benyong},
     title = {Feature Fusion for Blurring Detection in Image Forensics},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2014},
     volume = {E97-D},
     number = {6},
     pages = {1690--1693}}
    
  207. H. Yang & Z. Zhou
    Hiding the Trace of JPEG Compression History
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 909-913
    DOI: 10.1109/CSNT.2014.187
    BibTeX
    @inproceedings{Yang2014,
     author = {Yang, Hong and Zhou, Zhiping},
     title = {Hiding the Trace of JPEG Compression History},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {909--913}}
    
  208. J. Yang, J. Xie, G. Zhu, S. Kwong & Y.-Q. Shi
    An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(11), pp. 1933-1942
    DOI: 10.1109/TIFS.2014.2359368
    BibTeX
    @article{Yang2014b,
     author = {Yang, Jianquan and Xie, Jin and Zhu, Guopu and Kwong, Sam and Shi, Yun-Qing},
     title = {An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {11},
     pages = {1933--1942}}
    
  209. R. Yang
    Additive Noise Detection and Its Application to Audio Forensics
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-5
    DOI: 10.1109/APSIPA.2014.7041688
    BibTeX
    @inproceedings{Yang2014c,
     author = {Yang, Rui},
     title = {Additive Noise Detection and Its Application to Audio Forensics},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--5}}
    
  210. S. Yang, C. Qin, Z. Qian & B. Xu
    Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
    2014, pp. 130-133
    DOI: 10.1109/IIH-MSP.2014.39
    BibTeX
    @inproceedings{Yang2014d,
     author = {Yang, Shanshan and Qin, Chuan and Qian, Zhenxing and Xu, Boqing},
     title = {Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on},
     year = {2014},
     pages = {130--133}}
    
  211. H. Yan-Li, N. Shao-Zhang, Z. Jian-Cheng & Z. Lin-Na
    Forensics of Image Tampering Based on the Consistency of Illuminant Chromaticity
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041551
    BibTeX
    @inproceedings{Yan-Li2014,
     author = {Yan-Li, Huang and Shao-Zhang, Niu and Jian-Cheng, Zou and Lin-Na, Zhou},
     title = {Forensics of Image Tampering Based on the Consistency of Illuminant Chromaticity},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  212. H. Yan-li, N. Shao-Zhang, Z. Jian-Cheng & Z. Lin-Na
    Forensics of image tampering based on the consistency of illuminant chromaticity
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041551
    BibTeX
    @inproceedings{Yan-li2014,
     author = {Yan-li, H. and Shao-Zhang, N. and Jian-Cheng, Z. and Lin-Na, Z.},
     title = {Forensics of image tampering based on the consistency of illuminant chromaticity},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  213. H. Yong-Jian, G. Hua, Z. Jing & L. Bei-Bei
    Simplification and Analysis of Counter-attack Algorithm for Image Source Identification
    JSCUT(Natural Science Edition), 2014
    BibTeX
    @article{Yongjian2014,
     author = {Yong-Jian, Hu and Hua, Guan and Jing, Zhao and Bei-Bei, Liu},
     title = {Simplification and Analysis of Counter-attack Algorithm for Image Source Identification},
     journal = {JSCUT(Natural Science Edition)},
     year = {2014}}
    
  214. L. Yu, Q. Han & X. Niu
    Copy-rotation-move Forgery Detection Using the MROGH Descriptor
    Cloud Engineering (IC2E), 2014 IEEE International Conference on
    2014, pp. 510-513
    DOI: 10.1109/IC2E.2014.54
    BibTeX
    @inproceedings{Yu2014b,
     author = {Yu, Liyang and Han, Qi and Niu, Xiamu},
     title = {Copy-rotation-move Forgery Detection Using the MROGH Descriptor},
     booktitle = {Cloud Engineering (IC2E), 2014 IEEE International Conference on},
     year = {2014},
     pages = {510--513}}
    
  215. Z. Yu, L. Lin, B.W.-K. Ling, C.Y.-F. Ho, C. Qing, H. Xu, W. Dai, Y. Liang, J. Chen & Q. Dai
    Camera Identification for Very Low Bit Rate Time Varying Quantization Noise Videos
    Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on
    2014, pp. 208-212
    DOI: 10.1109/CSNDSP.2014.6923826
    BibTeX
    @inproceedings{Yu2014a,
     author = {Yu, Zitong and Lin, Lianshi and Ling, B. W.-K. and Ho, C. Y.-F. and Qing, Chunmei and Xu, Hailiang and Dai, Weihang and Liang, Yuming and Chen, Jiameng and Dai, Qingyun},
     title = {Camera Identification for Very Low Bit Rate Time Varying Quantization Noise Videos},
     booktitle = {Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on},
     year = {2014},
     pages = {208--212}}
    
  216. Z. Yu, R. Wang, S. Xin, W. Li & J. Wang
    Single-view Recaptured Photo Detection Based on Hsv Color Space
    Journal of Computational Information Systems, 2014, Vol. 10(8), pp. 3229-3236
    BibTeX
    @article{Yu2014,
     author = {Yu, Zan and Wang, Rangding and Xin, Shiqing and Li, Wei and Wang, Jiaji},
     title = {Single-view Recaptured Photo Detection Based on Hsv Color Space},
     journal = {Journal of Computational Information Systems},
     year = {2014},
     volume = {10},
     number = {8},
     pages = {3229--3236}}
    
  217. M. Zandi, A. Mahmoudi-Aznaveh & A. Mansouri
    Adaptive Matching for Copy-move Forgery Detection
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 119-124
    DOI: 10.1109/WIFS.2014.7084314
    BibTeX
    @inproceedings{Zandi2014,
     author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Mansouri, A.},
     title = {Adaptive Matching for Copy-move Forgery Detection},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {119--124}}
    
  218. H. Zeng & X. Kang
    Camera Source Identification Game with Incomplete Information
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_14
    BibTeX
    @article{Zeng2014a,
     author = {Zeng, Hui and Kang, Xiangui},
     title = {Camera Source Identification Game with Incomplete Information},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  219. H. Zeng, T. Qin, X. Kang & L. Liu
    Countering Anti-forensics of Median Filtering
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 2704-2708
    DOI: 10.1109/ICASSP.2014.6854091
    BibTeX
    @inproceedings{Zeng2014,
     author = {Zeng, Hui and Qin, Tengfei and Kang, Xiangui and Liu, Li},
     title = {Countering Anti-forensics of Median Filtering},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {2704--2708}}
    
  220. J. Zhang, Q. Ruan & Y. Jin
    Combined SIFT and Bi-coherence Features to Detect Image Forgery
    Signal Processing (ICSP), 2014 12th International Conference on
    2014, pp. 1859-1863
    DOI: 10.1109/ICOSP.2014.7015314
    BibTeX
    @inproceedings{Zhang2014d,
     author = {Zhang, Ju and Ruan, Qiuqi and Jin, Yi},
     title = {Combined SIFT and Bi-coherence Features to Detect Image Forgery},
     booktitle = {Signal Processing (ICSP), 2014 12th International Conference on},
     year = {2014},
     pages = {1859--1863}}
    
  221. R. Zhang & R.-D. Wang
    In-camera JPEG Compression Detection for Doubly Compressed Images
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-19
    DOI: 10.1007/s11042-014-1868-7
    BibTeX
    @article{Zhang2014a,
     author = {Zhang, Rong and Wang, Rang-Ding},
     title = {In-camera JPEG Compression Detection for Doubly Compressed Images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--19}}
    
  222. R.F. Zhang, H.M. Ye, Z.H. Song & M. Wang
    Blind Detection of Copy-move Forgery in Digital Images Based on Dyadic Wavelet Transform
    Cai, S. Z., Zhang, Q. F., Xu, X. P., Hu, D. H. & Qu, Y. M. (ed.)
    Chapter Chapter 7: Communication, Signal and Image Processing, Data Acquisition and Recognation Technologies
    Advanced Materials Research, Trans Tech Publications, 2014, Vol. 989-994, pp. 4127-4131
    DOI: 10.4028/www.scientific.net/AMR.989-994.4127
    BibTeX
    @article{Zhang2014c,
     author = {Zhang, Rui Fang and Ye, Han Min and Song, Zi Hang and Wang, Min},
     title = {Blind Detection of Copy-move Forgery in Digital Images Based on Dyadic Wavelet Transform},
     journal = {Advanced Materials Research},
     publisher = {Trans Tech Publications},
     year = {2014},
     volume = {989-994},
     pages = {4127--4131}}
    
  223. Y. Zhang, S. Li, S. Wang & Y.Q. Shi
    Revealing the Traces of Median Filtering Using High-order Local Ternary Patterns
    IEEE Signal Processing Letters, 2014, Vol. 21(3), pp. 275-279
    DOI: 10.1109/LSP.2013.2295858
    BibTeX
    @article{Zhang2014e,
     author = {Zhang, Y. and Li, S. and Wang, S. and Shi, Y. Q.},
     title = {Revealing the Traces of Median Filtering Using High-order Local Ternary Patterns},
     journal = {IEEE Signal Processing Letters},
     year = {2014},
     volume = {21},
     number = {3},
     pages = {275--279}}
    
  224. Y. Zhang, C. Zhao, F. Zhao & S. Li
    Blind Forensics of Median Filtering Based on Markov Statistics in Median-filtered Residual Domain
    Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
    The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2014, Vol. 246, pp. 179-186
    DOI: 10.1007/978-3-319-00536-2_21
    BibTeX
    @incollection{Zhang2014,
     author = {Zhang, Yujin and Zhao, Chenglin and Zhao, Feng and Li, Shenghong},
     title = {Blind Forensics of Median Filtering Based on Markov Statistics in Median-filtered Residual Domain},
     booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {246},
     pages = {179--186}}
    
  225. Z. Zhang, J. Hou, Q. Ma & Z. Li
    Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames
    Security and Communication Networks, 2014, pp. n/a-n/a
    DOI: 10.1002/sec.981
    BibTeX
    @article{Zhang2014b,
     author = {Zhang, Zhenzhen and Hou, Jianjun and Ma, Qinglong and Li, Zhaohong},
     title = {Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames},
     journal = {Security and Communication Networks},
     year = {2014},
     pages = {n/a--n/a}}
    
  226. X. Zhao, J. Li, S. Wang & S. Li
    A Distributed Local Margin Learning Based Scheme for High-dimensional Feature Processing in Image Tampering Detection
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890238
    BibTeX
    @inproceedings{Zhao2014a,
     author = {Zhao, Xudong and Li, Jianhua and Wang, Shilin and Li, Shenghong},
     title = {A Distributed Local Margin Learning Based Scheme for High-dimensional Feature Processing in Image Tampering Detection},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  227. X. Zhao, S. Wang, S. Li & J. Li
    Passive Image Splicing Detection by 2-D Noncausal Markov Model
    Circuits and Systems for Video Technology, IEEE Transactions on, 2014(99)
    DOI: 10.1109/TCSVT.2014.2347513
    BibTeX
    @article{Zhao2014,
     author = {Zhao, X. and Wang, S. and Li, S. and Li, J.},
     title = {Passive Image Splicing Detection by 2-D Noncausal Markov Model},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2014},
     number = {99}}
    
  228. X. Zhao, S. Wang, S. Li, J. Li & X. Lin
    A Distributed Scheme for Image Splicing Detection
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_23
    BibTeX
    @article{Zhao2014b,
     author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua and Lin, Xiang},
     title = {A Distributed Scheme for Image Splicing Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  229. J. Zheng & L. Chang
    Detection Technology of Tampering Image Based on Harris Corner Points
    Journal of Computational Information Systems, 2014, Vol. 10(4), pp. 1481-1488
    BibTeX
    @article{Zheng2014,
     author = {Zheng, Jiming and Chang, Liping},
     title = {Detection Technology of Tampering Image Based on Harris Corner Points},
     journal = {Journal of Computational Information Systems},
     year = {2014},
     volume = {10},
     number = {4},
     pages = {1481--1488}}
    
  230. J. Zheng & L. Chang
    Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors
    Journal of Information & Computational Scien, 2014, Vol. 11, pp. 3959-3966
    BibTeX
    @article{Zheng2014c,
     author = {Zheng, Jiming and Chang, Liping},
     title = {Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors},
     journal = {Journal of Information & Computational Scien},
     year = {2014},
     volume = {11},
     pages = {3959--3966}}
    
  231. J. Zheng, X. Song, J. Ren & T. Zhu
    Exposing Photo Manipulation Using Geometry and Shadows
    Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)
    Proc. SPIE, 2014, Vol. 9159, pp. 91591W-91591W-6
    DOI: 10.1117/12.2064531
    BibTeX
    @inproceedings{Zheng2014a,
     author = {Zheng, Jiangbin and Song, Xuemei and Ren, Jinchang and Zhu, Tingge},
     title = {Exposing Photo Manipulation Using Geometry and Shadows},
     booktitle = {Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9159},
     pages = {91591W-91591W-6}}
    
  232. J. Zheng, T. Zhu, Z. Li, W. Xing & J. Ren
    Exposing Image Forgery by Detecting Traces of Feather Operation
    2014
    BibTeX
    @misc{Zheng2014b,
     author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang},
     title = {Exposing Image Forgery by Detecting Traces of Feather Operation},
     year = {2014}}
    
  233. D. Zhu & Z. Zhou
    Resampling Tamper Detection Based on JPEG Double Compression
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 914-918
    DOI: 10.1109/CSNT.2014.188
    BibTeX
    @inproceedings{Zhu2014,
     author = {Zhu, Dan and Zhou, Zhiping},
     title = {Resampling Tamper Detection Based on JPEG Double Compression},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {914--918}}
    
  234. N. Zhu, X. Gao & C. Deng
    Image scaling factor estimation based on normalized energy density and learning to rank
    Proc. Int Security, Pattern Analysis, and Cybernetics (SPAC) Conf
    2014, pp. 197-202
    DOI: 10.1109/SPAC.2014.6982684
    BibTeX
    @inproceedings{Zhu2014a,
     author = {Zhu, N. and Gao, X. and Deng, C.},
     title = {Image scaling factor estimation based on normalized energy density and learning to rank},
     booktitle = {Proc. Int Security, Pattern Analysis, and Cybernetics (SPAC) Conf},
     year = {2014},
     pages = {197--202}}
    
  235. M. Zimba
    DWT-SATs Based Detection of Image Region Cloning
    International Journal of Physical, Natural Science and Engineering, 2014, Vol. 8(2)
    BibTeX
    @article{Zimba2014,
     author = {Zimba, Michael},
     title = {DWT-SATs Based Detection of Image Region Cloning},
     journal = {International Journal of Physical, Natural Science and Engineering},
     year = {2014},
     volume = {8},
     number = {2}}
    
  236. Digital-Forensics and Watermarking
    Shi, Y. Q., Kim, H. J. & Pérez-González, F. (ed.)
    Springer Berlin Heidelberg, 2014
    BibTeX
    @book{Shi2014a,,
     title = {Digital-Forensics and Watermarking},
     publisher = {Springer Berlin Heidelberg},
     year = {2014}}
    


2013

  1. J. Ackermann & M. Goesele
    How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images
    Tominaga, S., Schettini, R. & Trémeau, A. (ed.)
    Computational Color Imaging
    Springer Berlin Heidelberg, 2013, Vol. 7786, pp. 90-104
    DOI: 10.1007/978-3-642-36700-7_8
    BibTeX
    @incollection{Ackermann2013,
     author = {Ackermann, Jens and Goesele, Michael},
     title = {How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images},
     booktitle = {Computational Color Imaging},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7786},
     pages = {90--104}}
    
  2. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    Counter-forensics of SIFT-based copy-move detection by means of keypoint classification
    EURASIP Journal on Image and Video Processing, 2013, Vol. 2013(1), pp. 18
    DOI: 10.1186/1687-5281-2013-18
    BibTeX
    @article{Amerini2013b,
     author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea},
     title = {Counter-forensics of SIFT-based copy-move detection by means of keypoint classification},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2013},
     volume = {2013},
     number = {1},
     pages = {18}}
    
  3. Abbadi
    Blind Fake Image detection
    IJCSI International Journal of Computer Science Issues, 2013, Vol. 10(4-1), pp. 180-186
    DOI: 10.1093/ietcom/e89-b.5.1726
    BibTeX
    @article{Abbadi2013,
     author = {Abbadi},
     title = {Blind Fake Image detection},
     journal = {IJCSI International Journal of Computer Science Issues},
     year = {2013},
     volume = {10},
     number = {4-1},
     pages = {180--186}}
    
  4. K. Abcyrathne, W. Wijesinghe, G. Godaliyadda, M. Ekanayake & J. Wijayakulasooriya
    Temporal ICA based source extraction from dynamic image sequences with visual interference under noise
    Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on
    2013, pp. 671-675
    DOI: 10.1109/ICIInfS.2013.6732065
    BibTeX
    @inproceedings{Abcyrathne2013,
     author = {Abcyrathne, K.A.B.S. and Wijesinghe, W.V.D. and Godaliyadda, G.M.R.I. and Ekanayake, M.P.B. and Wijayakulasooriya, J.V.},
     title = {Temporal ICA based source extraction from dynamic image sequences with visual interference under noise},
     booktitle = {Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on},
     year = {2013},
     pages = {671--675}}
    
  5. J.E. Adams Jr & B. Pillman
    Digital Camera Image Formation: Introduction and Hardware
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 3-44
    DOI: 10.1007/978-1-4614-0757-7_1
    BibTeX
    @incollection{AdamsJr2013,
     author = {Adams Jr, James E. and Pillman, Bruce},
     title = {Digital Camera Image Formation: Introduction and Hardware},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {3--44}}
    
  6. E. Agnes, S.D. Mahalakshmi & K. Vijayalakshmi
    A Forensic Method for Detecting Image Forgery Using Codebook
    International Journal of Advanced Research in Computer Science and Software Engineering, 2013
    DOI: 10.1109/ice-ccn.2013.6528568
    BibTeX
    @article{Agnes2013,
     author = {E. Agnes and S. Devi Mahalakshmi and K. Vijayalakshmi},
     title = {A Forensic Method for Detecting Image Forgery Using Codebook},
     journal = {International Journal of Advanced Research in Computer Science and Software Engineering},
     year = {2013}}
    
  7. A. Al Ahmadi, M. Hussain, H. Aboalsamh, G. Muhammad & G. Bebis
    Splicing image forgery detection based on DCT and Local Binary Pattern
    Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE
    2013, pp. 253-256
    DOI: 10.1109/GlobalSIP.2013.6736863
    BibTeX
    @inproceedings{AlAhmadi2013,
     author = {Al Ahmadi, A.A. and Hussain, M. and Aboalsamh, H. and Muhammad, G. and Bebis, G.},
     title = {Splicing image forgery detection based on DCT and Local Binary Pattern},
     booktitle = {Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE},
     year = {2013},
     pages = {253--256}}
    
  8. M. Al Sawadi, G. Muhammad & M. Hussain
    Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering
    Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.
    2013
    DOI: 10.1109/ems.2013.43
    BibTeX
    @inproceedings{AlSawadi2013,
     author = {Al Sawadi, Motasem and Ghulam Muhammad and Muhammad Hussain},
     title = {Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering},
     booktitle = {Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.},
     year = {2013}}
    
  9. A.A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad & G. Bebis
    Splicing image forgery detection based on DCT and Local Binary Pattern
    Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)
    2013, pp. 253-256
    DOI: 10.1109/GlobalSIP.2013.6736863
    BibTeX
    @inproceedings{Alahmadi2013,
     author = {A. A. Alahmadi and M. Hussain and H. Aboalsamh and G. Muhammad and G. Bebis},
     title = {Splicing image forgery detection based on DCT and Local Binary Pattern},
     booktitle = {Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)},
     year = {2013},
     pages = {253--256}}
    
  10. M.H. Al-Hammadi, G. Muhammad, M. Hussain & G. Bebis
    Curvelet Transform and Local Texture Based Image Forgery Detection
    Advances in Visual Computing, Springer, 2013
    DOI: 10.1007/978-3-642-41939-3_49
    BibTeX
    @article{Al-Hammadi2013,
     author = {Al-Hammadi, Muneer H. and Muhammad, Ghulam and Hussain, Muhammad and Bebis, George},
     title = {Curvelet Transform and Local Texture Based Image Forgery Detection},
     journal = {Advances in Visual Computing},
     publisher = {Springer},
     year = {2013}}
    
  11. O.M. Al-Qershi & B.E. Khoo
    Passive detection of copy-move forgery in digital images: State-of-the-art
    Forensic Science International, 2013, Vol. 231(1-3), pp. 284-295
    DOI: 10.1016/j.forsciint.2013.05.027
    BibTeX
    @article{Al-Qershi2013,
     author = {Osamah M. Al-Qershi and Bee Ee Khoo},
     title = {Passive detection of copy-move forgery in digital images: State-of-the-art},
     journal = {Forensic Science International},
     year = {2013},
     volume = {231},
     number = {1--3},
     pages = {284--295}}
    
  12. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo & G. Serra
    Copy-move forgery detection and localization by means of robust clustering with J-linkage
    Signal Processing: Image Communication, Elsevier, 2013
    DOI: 10.1016/j.image.2013.03.006
    BibTeX
    @article{Amerini2013,
     author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Del Bimbo, Alberto and Del Tongo, Luca and Serra, Giuseppe},
     title = {Copy-move forgery detection and localization by means of robust clustering with J-linkage},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier},
     year = {2013}}
    
  13. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    SIFT keypoint removal and injection for countering matching-based image forensics
    Proceedings of the first ACM workshop on Information hiding and multimedia security
    ACM, 2013, pp. 123-130
    DOI: 10.1145/2482513.2482524
    BibTeX
    @inproceedings{Amerini2013a,
     author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea},
     title = {SIFT keypoint removal and injection for countering matching-based image forensics},
     booktitle = {Proceedings of the first ACM workshop on Information hiding and multimedia security},
     publisher = {ACM},
     year = {2013},
     pages = {123--130}}
    
  14. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics
    EURASIP Journal on Information Security, 2013
    DOI: 10.1186/1687-417x-2013-8
    BibTeX
    @article{Amerini2013c,
     author = {Irene Amerini and Mauro Barni and Roberto Caldelli and Andrea Costanzo},
     title = {Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics},
     journal = {EURASIP Journal on Information Security},
     year = {2013}}
    
  15. S.H. Anamandra & V. Chandrasekaran
    CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor
    Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
    2013, pp. 1-5
    DOI: 10.1109/NCVPRIPG.2013.6776154
    BibTeX
    @inproceedings{Anamandra2013,
     author = {S. H. Anamandra and V. Chandrasekaran},
     title = {CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor},
     booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)},
     year = {2013},
     pages = {1--5}}
    
  16. S. Arathy, D.S. Vidyadharan, C Balan & T Sobha
    Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera
    Control Communication and Computing (ICCC), 2013 International Conference on
    2013, pp. 96-101
    DOI: 10.1109/ICCC.2013.6731631
    BibTeX
    @inproceedings{Arathy2013,
     author = {S Arathy and Vidyadharan, Divya S and Balan C and Sobha T},
     title = {Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera},
     booktitle = {Control Communication and Computing (ICCC), 2013 International Conference on},
     year = {2013},
     pages = {96--101}}
    
  17. D. Asatryan, N. Asatryan, N. Lanina & A. Petrosyan
    Method for detection of image tampering and partial recovery
    Computer Science and Information Technologies (CSIT), 2013
    2013, pp. 1-6
    DOI: 10.1109/CSITechnol.2013.6710350
    BibTeX
    @inproceedings{Asatryan2013,
     author = {Asatryan, D. and Asatryan, N. and Lanina, N. and Petrosyan, A.},
     title = {Method for detection of image tampering and partial recovery},
     booktitle = {Computer Science and Information Technologies (CSIT), 2013},
     year = {2013},
     pages = {1--6}}
    
  18. Associated-Press
    AP News Values & Principles
    2013
    BibTeX
    @electronic{AssociatedPress2013,
     author = {Associated-Press, },
     title = {AP News Values & Principles},
     year = {2013}}
    
  19. N.A.N. Azhan, I.R. Adeyemi & S.A. Razak
    Analysis of DQT and DHT in JPEG Files
    International Journal of Information Technology and Computer Science ( IJITCS ), 2013
    BibTeX
    @article{Azhan2013,
     author = {Nor Amira Nor Azhan and Ikuesan R. Adeyemi and Shukor Abd Razak},
     title = {Analysis of DQT and DHT in JPEG Files},
     journal = {International Journal of Information Technology and Computer Science ( IJITCS )},
     year = {2013}}
    
  20. R. Böhme & M. Kirchner
    Counter-Forensics: Attacking Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer Science mathplus Business Media, 2013, pp. 327-366
    DOI: 10.1007/978-1-4614-0757-7_12
    BibTeX
    @incollection{Boehme2013,
     author = {Rainer Böhme and Matthias Kirchner},
     title = {Counter-Forensics: Attacking Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     pages = {327--366}}
    
  21. K.S. Bacchuwar & K. Ramakrishnan
    A jump patch-block match algorithm for multiple forgery detection
    Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on
    2013, pp. 723-728
    DOI: 10.1109/iMac4s.2013.6526502
    BibTeX
    @inproceedings{Department2013,
     author = {Bacchuwar, Ketan S and Ramakrishnan, K.R},
     title = {A jump patch-block match algorithm for multiple forgery detection},
     booktitle = {Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on},
     year = {2013},
     pages = {723--728}}
    
  22. K. Bahrami, A.C. Kot & J. Fan
    Splicing detection in out-of-focus blurred images
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 144-149
    DOI: 10.1109/WIFS.2013.6707809
    BibTeX
    @inproceedings{Bahrami2013,
     author = {Bahrami, Khosro and Kot, Alex C. and Fan, Jiayuan},
     title = {Splicing detection in out-of-focus blurred images},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {144--149}}
    
  23. M. Barni, M. Fontani & B. Tondi
    A Universal Attack Against Histogram-Based Image Forensics
    International Journal of Digital Crime and Forensics (IJDCF), 2013
    DOI: 10.4018/jdcf.2013070103
    BibTeX
    @article{Barni2013a,
     author = {Mauro Barni and Marco Fontani and Benedetta Tondi},
     title = {A Universal Attack Against Histogram-Based Image Forensics},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2013}}
    
  24. M. Barni & B. Tondi
    The Source Identification Game:an Information-Theoretic Perspective
    IEEE Transactions on Information Forensics and Security, 2013
    DOI: 10.1109/TIFS.2012.2237397
    BibTeX
    @article{Barni2013,
     author = {Barni, Mauro and Tondi, Benedetta},
     title = {The Source Identification Game:an Information-Theoretic Perspective},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013}}
    
  25. P. Bestagini, S. Battaglia, S. Milani, M. Tagliasacchi & S. Tubaro
    Detection of Temporal Interpolation In Video Sequences
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013, 2013
    BibTeX
    @inproceedings{Bestagini2013,
     author = {Paolo Bestagini and Simone Battaglia and Simone Milani and Marco Tagliasacchi and Stefano Tubaro},
     title = {Detection of Temporal Interpolation In Video Sequences},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     year = {2013}}
    
  26. S. Bian, W. Luo & J. Huang
    Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity
    Multimedia Tools and Applications, Springer US, 2013, Vol. -, pp. 1-15
    DOI: 10.1007/s11042-013-1364-5
    BibTeX
    @article{Bian2013,
     author = {Bian, Shan and Luo, Weiqi and Huang, Jiwu},
     title = {Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2013},
     volume = {-},
     pages = {1--15}}
    
  27. T. Bianchi, A. Piva & F. Perez-Gonzalez
    Near optimal detection of quantized signals and application to JPEG forensics
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 168-173
    DOI: 10.1109/WIFS.2013.6707813
    BibTeX
    @inproceedings{Bianchi2013,
     author = {Bianchi, Tiziano and Piva, Alessandro and Perez-Gonzalez, Fernando},
     title = {Near optimal detection of quantized signals and application to JPEG forensics},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {168--173}}
    
  28. A. Biney & H. Sellahewa
    Analysis of Smartphone Model Identification using Digital Images
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4487-4491
    BibTeX
    @inproceedings{Biney2013,
     author = {Akua Biney and Harin Sellahewa},
     title = {Analysis of Smartphone Model Identification using Digital Images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4487--4491}}
    
  29. G.K. Birajdar & V.H. Mankar
    Digital image forgery detection using passive techniques: A survey
    Digital Investigation, 2013, Vol. 10(3), pp. 226-245
    DOI: 10.1016/j.diin.2013.04.007
    BibTeX
    @article{Birajdar2013,
     author = {Gajanan K. Birajdar and Vijay H. Mankar},
     title = {Digital image forgery detection using passive techniques: A survey},
     journal = {Digital Investigation},
     year = {2013},
     volume = {10},
     number = {3},
     pages = {226--245}}
    
  30. G.K. Birajdar & V.H. Mankar
    Blind Authentication of Resampled Images and Rescaling Factor Estimation
    Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on
    2013, pp. 112-116
    DOI: 10.1109/CUBE.2013.28
    BibTeX
    @inproceedings{Birajdar2013a,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Blind Authentication of Resampled Images and Rescaling Factor Estimation},
     booktitle = {Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on},
     year = {2013},
     pages = {112--116}}
    
  31. K. Bolouri, M. Javanmard & M. Firouzmand
    Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
    Journal of Information Systems and Telecommunication, 2013
    BibTeX
    @article{Bolouri2013,
     author = {Kimia Bolouri and Mehdi Javanmard and Mohammad Firouzmand},
     title = {Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier},
     journal = {Journal of Information Systems and Telecommunication},
     year = {2013}}
    
  32. S. Bourouis, M.A. Mashrgy & N. Bouguila
    Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection
    Expert Systems with Applications, 2013(0), pp. -
    DOI: 10.1016/j.eswa.2013.09.030
    BibTeX
    @article{Bourouis2013,
     author = {Sami Bourouis and Mohamed Al Mashrgy and Nizar Bouguila},
     title = {Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection},
     journal = {Expert Systems with Applications},
     year = {2013},
     number = {0},
     pages = {-}}
    
  33. A. Bruna
    Applied Image Processing Algorithms for Forensic Applications
    Universita’ Degli Studi Di Catania, Universita’ Degli Studi Di Catania, 2013
    BibTeX
    @phdthesis{Bruna2013,
     author = {Bruna, A.R.},
     title = {Applied Image Processing Algorithms for Forensic Applications},
     school = {Universita’ Degli Studi Di Catania},
     year = {2013}}
    
  34. H. Cao & A. Kot
    Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8, pp. 608-618
    DOI: 10.1109/TIFS.2013.2249064
    BibTeX
    @article{Cao2013,
     author = {Cao, H. and Kot, A.C.},
     title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     pages = {608--618}}
    
  35. T. de Carvalho, C. Riess, E. Angelopoulou, H. Pedrini & A.R. Rocha
    Exposing Digital Image Forgeries by Illumination Color Classification
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(7), pp. 1182-1194
    DOI: 10.1109/TIFS.2013.2265677
    BibTeX
    @article{Carvalho2013,
     author = {de Carvalho, T. and Riess, C. and Angelopoulou, E. and Pedrini, H. and Rocha, A. R.},
     title = {Exposing Digital Image Forgeries by Illumination Color Classification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {7},
     pages = {1182--1194}}
    
  36. S. Chakraborty
    Copy move image forgery detection using mutual information
    Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ICCCNT.2013.6726743
    BibTeX
    @inproceedings{Chakraborty2013,
     author = {Chakraborty, Somnath},
     title = {Copy move image forgery detection using mutual information},
     booktitle = {Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on},
     year = {2013},
     pages = {1--4}}
    
  37. L.-H. Chan, N.-F. Law & W.-C. Siu
    A confidence map and pixel-based weighted correlation for PRNU-based camera identification
    Digital Investigation, Elsevier, 2013
    BibTeX
    @article{Chan2013,
     author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi},
     title = {A confidence map and pixel-based weighted correlation for PRNU-based camera identification},
     journal = {Digital Investigation},
     publisher = {Elsevier},
     year = {2013}}
    
  38. T.-Y. Chang, G.-S. Lin & S.-C. Tai
    Identifying Device Brand by Using Characteristics of Color Filter Array
    Pan, J.-S., Yang, C.-N. & Lin, C.-C. (ed.)
    Advances in Intelligent Systems and Applications - Volume 2
    Springer Berlin Heidelberg, 2013, Vol. 21, pp. 349-358
    DOI: 10.1007/978-3-642-35473-1_35
    BibTeX
    @incollection{Chang2013,
     author = {Chang, Tang-You and Lin, Guo-Shiang and Tai, Shen-Chuan},
     title = {Identifying Device Brand by Using Characteristics of Color Filter Array},
     booktitle = {Advances in Intelligent Systems and Applications - Volume 2},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {21},
     pages = {349--358}}
    
  39. C. Chen, J. Ni & J. Huang
    Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
    Image Processing, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIP.2013.2277814
    BibTeX
    @article{Chen2013c,
     author = {Chen, C. and Ni, J. and Huang, J.},
     title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach},
     journal = {Image Processing, IEEE Transactions on},
     year = {2013},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  40. C. Chen, J. Ni & J. Huang
    Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
    IEEE_J_IP, 2013, Vol. 22(12), pp. 4699-4710
    DOI: 10.1109/TIP.2013.2277814
    BibTeX
    @article{Chen2013g,
     author = {C. Chen and J. Ni and J. Huang},
     title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach},
     journal = {IEEE_J_IP},
     year = {2013},
     volume = {22},
     number = {12},
     pages = {4699--4710}}
    
  41. L. Chen, W. Lu & J. Ni
    3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
    Li, C.-T. (ed.)
    Emerging Digital Forensics Application for Crime Detection, Prevention and Security
    Chapter 3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
    IGI Global, 2013, pp. 35-49
    DOI: 10.4018/978-1-4666-4006-1.ch003
    BibTeX
    @inbook{Chen2013d,
     author = {Likai Chen and Wei Lu and Jianqun Ni},
     title = {3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection},
     booktitle = {Emerging Digital Forensics Application for Crime Detection, Prevention and Security},
     publisher = {IGI Global},
     year = {2013},
     pages = {35--49}}
    
  42. L. Chen, W. Lu, J. Ni, W. Sun & J. Huang
    Region duplication detection based on Harris corner points and step sector statistics
    Journal of Visual Communication and Image Representation, Elsevier, 2013, Vol. 24(3), pp. 244-254
    DOI: 10.1016/j.jvcir.2013.01.008
    BibTeX
    @article{Chen2013a,
     author = {Chen, Likai and Lu, Wei and Ni, Jiangqun and Sun, Wei and Huang, Jiwu},
     title = {Region duplication detection based on Harris corner points and step sector statistics},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier},
     year = {2013},
     volume = {24},
     number = {3},
     pages = {244--254}}
    
  43. L. Chen, S. Wang, S. Li & J. Li
    Countering Universal Image Tampering Detection with Histogram Restoration
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 282-289
    DOI: 10.1007/978-3-642-40099-5_23
    BibTeX
    @incollection{Chen2013b,
     author = {Chen, Luyi and Wang, Shilin and Li, Shenghong and Li, Jianhua},
     title = {Countering Universal Image Tampering Detection with Histogram Restoration},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {282--289}}
    
  44. S. Chen, A. Pande, K. Zeng & P. Mohapatra
    Video Source Identification in Lossy Wireless Networks
    Department of Computer Science, University of California, Davis, CA 95616, Department of Computer Science, University of California, Davis, CA 95616, 2013
    BibTeX
    @techreport{Chen2013,
     author = {Chen, S. and Pande, A. and Zeng, K. and Mohapatra, P.},
     title = {Video Source Identification in Lossy Wireless Networks},
     school = {Department of Computer Science, University of California, Davis, CA 95616},
     year = {2013}}
    
  45. Y.-L. Chen & C.-T. Hsu
    What has been tampered? From a sparse manipulation perspective
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 123-128
    DOI: 10.1109/MMSP.2013.6659275
    BibTeX
    @inproceedings{Chen2013e,
     author = {Chen, Yi-Lei and Hsu, Chiou-Ting},
     title = {What has been tampered? From a sparse manipulation perspective},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {123--128}}
    
  46. Z. Chen, Y. Zhao & R. Ni
    Forensics of blurred images based on no-reference image quality assessment
    Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on
    2013, pp. 437-441
    DOI: 10.1109/ChinaSIP.2013.6625377
    BibTeX
    @inproceedings{Chen2013f,
     author = {Zhipeng Chen and Yao Zhao and Rongrong Ni},
     title = {Forensics of blurred images based on no-reference image quality assessment},
     booktitle = {Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on},
     year = {2013},
     pages = {437--441}}
    
  47. G. Chierchia, G. Poggi, C. Sansone & L. Verdoliva
    PRNU-based forgery detection with regularity constraints and global optimization
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 236-241
    DOI: 10.1109/MMSP.2013.6659294
    BibTeX
    @inproceedings{Chierchia2013,
     author = {Giovann Chierchia and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {PRNU-based forgery detection with regularity constraints and global optimization},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {236--241}}
    
  48. Chippendale
    Geo-positional Image Forensics through Scene-terrain Registration
    Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)
    Scitepress, 2013
    DOI: 10.5220/0004282300410047
    BibTeX
    @conference{Chippendale2013,
     author = {Chippendale},
     title = {Geo-positional Image Forensics through Scene-terrain Registration},
     booktitle = {Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)},
     publisher = {Scitepress},
     year = {2013}}
    
  49. C.-H. Choi, H.-Y. Lee & H.-K. Lee
    Estimation of color modification in digital images by CFA pattern change
    Forensic Science International, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.forsciint.2012.12.014
    BibTeX
    @article{Choi2013,
     author = {Chang-Hee Choi and Hae-Yeoun Lee and Heung-Kyu Lee},
     title = {Estimation of color modification in digital images by CFA pattern change},
     journal = {Forensic Science International},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  50. X. Chu, M.C. Stamm & K.J.R.L. Yan Chen
    Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3063-3067
    DOI: 10.1109/ICASSP.2013.6638221
    BibTeX
    @inproceedings{Chu2013a,
     author = {Xiaoyu Chu and Matthew C. Stamm and Yan Chen, K. J. Ray Liu},
     title = {Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013},
     pages = {3063--3067}}
    
  51. Ciptasari
    Exploiting reference images in exposing geometrical distortions
    International Journal of Multimedia & Its Applications (IJMA), 2013, Vol. 5(3)
    BibTeX
    @article{Ciptasari2013,
     author = {Ciptasari},
     title = {Exploiting reference images in exposing geometrical distortions},
     journal = {International Journal of Multimedia & Its Applications (IJMA)},
     year = {2013},
     volume = {5},
     number = {3}}
    
  52. R. Ciptasari, K.-H. Rhee & K. Sakurai
    Image Splicing Verification Based on Pixel-Based Alignment Method
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 198-212
    DOI: 10.1007/978-3-642-40099-5_17
    BibTeX
    @incollection{Ciptasari2013a,
     author = {Ciptasari, RimbaWhidiana and Rhee, Kyung-Hyune and Sakurai, Kouichi},
     title = {Image Splicing Verification Based on Pixel-Based Alignment Method},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {198--212}}
    
  53. P. Comesana, F. Perez-Gonzalez & N. Liste
    Quantization Lattice Estimation for Multimedia Forensics
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4462 - 4466
    BibTeX
    @inproceedings{Comesana2013,
     author = {Pedro Comesana and Fernando Perez-Gonzalez and and Noelia Liste},
     title = {Quantization Lattice Estimation for Multimedia Forensics},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4462 -- 4466}}
    
  54. P. Comesaña-Alfaro & F. Pérez-González
    Optimal Counterforensics For Histogram-based Forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638218
    BibTeX
    @inproceedings{Comesana-Alfaro2013,
     author = {Pedro Comesaña-Alfaro and Fernando Pérez-González},
     title = {Optimal Counterforensics For Histogram-based Forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  55. V. Conotter, P. Comesana & F. Pérez-González
    Joint detection of full-frame linear filtering and JPEG compression in digital images
    2013
    BibTeX
    @electronic{Conotter2013a,
     author = {Conotter, V and Comesana, P and Pérez-González, F},
     title = {Joint detection of full-frame linear filtering and JPEG compression in digital images},
     year = {2013}}
    
  56. V. Conotter, P. Comesaña-Alfaro & F. Pérez-González
    Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4517 - 4521
    BibTeX
    @inproceedings{Conotter2013,
     author = {Valentina Conotter and Pedro Comesaña-Alfaro and Fernando Pérez-González},
     title = {Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4517 -- 4521}}
    
  57. A.J. Cooper
    Improved photo response non-uniformity (PRNU) based source camera identification
    Forensic Science International, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.forsciint.2012.12.018
    BibTeX
    @article{Cooper2013,
     author = {Alan J. Cooper},
     title = {Improved photo response non-uniformity (PRNU) based source camera identification},
     journal = {Forensic Science International},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  58. J.R. Corripio, A.L.S. Orozco, L.J.G. Villalba, J. Hernandez-Castro & S.J. Gibson
    Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform
    The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK., 2013
    BibTeX
    @article{Corripio2013,
     author = {Jocelin Rosales Corripio and Ana Lucila Sandoval Orozco and Luis Javier Garc’ıa Villalba and Julio Hernandez-Castro and Stuart James Gibson},
     title = {Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform},
     journal = {The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK.},
     year = {2013}}
    
  59. F.O. de Costa, E. Silva, M. Eckmann, W.J. Scheirer & A. Rocha
    Open Set Source Camera Attribution and Device Linking
    Pattern Recognition Letters, 2013(0), pp. -
    DOI: 10.1016/j.patrec.2013.09.006
    BibTeX
    @article{deCosta2013,
     author = {Filipe O. de Costa and Ewerton Silva and Michael Eckmann and Walter J. Scheirer and Anderson Rocha},
     title = {Open Set Source Camera Attribution and Device Linking},
     journal = {Pattern Recognition Letters},
     year = {2013},
     number = {0},
     pages = {-}}
    
  60. D. Cozzolino, F. Gargiulo, C. Sansone & L. Verdoliva
    Multiple Classifier Systems for Image Forgery Detection
    Proc. of the International Conference on Image Analysis and Processing (ICIAP)
    International Conference on Image Analysis and Processing (ICIAP), 2013
    DOI: 10.1007/978-3-642-41184-7_27
    BibTeX
    @inproceedings{Cozzolino2013,
     author = {D. Cozzolino and F. Gargiulo and C. Sansone and L. Verdoliva},
     title = {Multiple Classifier Systems for Image Forgery Detection},
     booktitle = {Proc. of the International Conference on Image Analysis and Processing (ICIAP)},
     journal = {International Conference on Image Analysis and Processing (ICIAP)},
     year = {2013}}
    
  61. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    A novel framework for image forgery localization
    arXiv.org, 2013
    BibTeX
    @article{Cozzolino2013a,
     author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva},
     title = {A novel framework for image forgery localization},
     journal = {arXiv.org},
     year = {2013}}
    
  62. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image forgery detection based on the fusion of machine learning and block-matching methods
    arXiv.org, 2013
    BibTeX
    @article{Cozzolino2013b,
     author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva},
     title = {Image forgery detection based on the fusion of machine learning and block-matching methods},
     journal = {arXiv.org},
     year = {2013}}
    
  63. HYUN Dai-Kyung, JUNG Dae-Jin, LEE Hae-Yeoun & LEE Heung-Kyu
    Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter
    IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(6), pp. 1394-1397
    DOI: 10.1587/transinf.e96.d.1394
    BibTeX
    @article{HYUN2013,
     author = {Dai-Kyung HYUN and Dae-Jin JUNG and Hae-Yeoun LEE and Heung-Kyu LEE},
     title = {Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2013},
     volume = {E96-D},
     number = {6},
     pages = {1394--1397}}
    
  64. D.T. Dang-Nguyen, I.D. Gebru, V. Conotter, G. Boato & F.G.B.D. Natale
    Counter-forensics of median filtering
    Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop
    2013, pp. 260-265
    DOI: 10.1109/MMSP.2013.6659298
    BibTeX
    @inproceedings{Dang-Nguyen2013,
     author = {D. T. Dang-Nguyen and I. D. Gebru and V. Conotter and G. Boato and F. G. B. De Natale},
     title = {Counter-forensics of median filtering},
     booktitle = {Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop},
     year = {2013},
     pages = {260--265}}
    
  65. U. Datta & C. Sharma
    Analysis of Copy-Move Image Forgery Detection
    IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE), 2013, Vol. 2(2)
    BibTeX
    @article{Datta2013,
     author = {Unmukh Datta and Chetna Sharma},
     title = {Analysis of Copy-Move Image Forgery Detection},
     journal = {IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE)},
     year = {2013},
     volume = {2},
     number = {2}}
    
  66. R. Davarzani, K. Yaghmaie, S. Mozaffari & M. Tapak
    Copy-move forgery detection using multiresolution local binary patterns
    Forensic Science International, 2013, Vol. 231(1-3), pp. 61-72
    DOI: 10.1016/j.forsciint.2013.04.023
    BibTeX
    @article{Davarzani2013,
     author = {Reza Davarzani and Khashayar Yaghmaie and Saeed Mozaffari and Meysam Tapak},
     title = {Copy-move forgery detection using multiresolution local binary patterns},
     journal = {Forensic Science International},
     year = {2013},
     volume = {231},
     number = {1--3},
     pages = {61--72}}
    
  67. A. Deever, M. Kumar & B. Pillman
    Digital Camera Image Formation: Processing and Storage
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 45-78
    BibTeX
    @incollection{Deever2013,
     author = {Aaron Deever and Mrityunjay Kumar and Bruce Pillman},
     title = {Digital Camera Image Formation: Processing and Storage},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {45--78}}
    
  68. Z. Deng, J. Zhang & Y. Zeng
    Image Splicing Detection via Demosaicking Inconsistency
    2013
    BibTeX
    @electronic{Deng2013,
     author = {Zhonghai Deng and Jingyuan Zhang and Yuguang Zeng},
     title = {Image Splicing Detection via Demosaicking Inconsistency},
     year = {2013}}
    
  69. F.N. Dezfoli, A. Dehghantanha, R. Mahmoud, N.F.B.M. Sani & F. Daryaba
    Digital Forensic Trends and Future
    International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2013, Vol. 2(2), pp. 48-76
    BibTeX
    @article{Dezfoli2013,
     author = {Farhood Norouzizadeh Dezfoli and Ali Dehghantanha and Ramlan Mahmoud and Nor Fazlida Binti Mohd Sani and Farid Daryaba},
     title = {Digital Forensic Trends and Future},
     journal = {International Journal of Cyber-Security and Digital Forensics (IJCSDF)},
     year = {2013},
     volume = {2},
     number = {2},
     pages = {48--76}}
    
  70. J. Dong & W. Wang
    CASIA Image Tampering Detection Evaluation Database
    2013 IEEE China Summit and International Conference on Signal and Information Processing
    Institute of Electrical and Electronics Engineers (IEEE), 2013, pp. 422-426
    DOI: 10.1109/chinasip.2013.6625374
    BibTeX
    @inproceedings{Dong2013,
     author = {Jing Dong and Wei Wang},
     title = {CASIA Image Tampering Detection Evaluation Database},
     booktitle = {2013 IEEE China Summit and International Conference on Signal and Information Processing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2013},
     pages = {422--426}}
    
  71. M. Doyoddorj & K.-H. Rhee
    A blind forgery detection scheme using image compatibility metrics
    Industrial Electronics (ISIE), 2013 IEEE International Symposium on
    2013, pp. 1-6
    DOI: 10.1109/ISIE.2013.6563873
    BibTeX
    @inproceedings{Doyoddorj2013,
     author = {M. Doyoddorj and Rhee, Kyung-Hyune},
     title = {A blind forgery detection scheme using image compatibility metrics},
     booktitle = {Industrial Electronics (ISIE), 2013 IEEE International Symposium on},
     year = {2013},
     pages = {1--6}}
    
  72. Z.F. Elsharkawy, S.A. Abdelwahab, S.M. Elaraby, M.I. Dessouky & F.E. Abd El-Samie
    Accurate and Robust Identifying Forged Region Method in Scanned Images
    International Journal of Computer Applications, 2013, Vol. 83, pp. 40-47
    BibTeX
    @article{Elsharkawy2013,
     author = {Elsharkawy, Zeinab F., Abdelwahab, Safey A., Elaraby, Sayed M., Dessouky, Moawad I., Abd El-Samie, Fathi E.},
     title = {Accurate and Robust Identifying Forged Region Method in Scanned Images},
     journal = {International Journal of Computer Applications},
     year = {2013},
     volume = {83},
     pages = {40--47}}
    
  73. J. Fan, H. Cao & A. Kot
    Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
    Information Forensics and Security, IEEE Transactions on, IEEE, 2013, Vol. 8(4), pp. 608-618
    DOI: 10.1109/TIFS.2013.2249064
    BibTeX
    @article{Fan2013a,
     author = {Fan, Jiayuan and Cao, Hong and Kot, A},
     title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     publisher = {IEEE},
     year = {2013},
     volume = {8},
     number = {4},
     pages = {608--618}}
    
  74. W. Fan, K. Wang, F. Cayre & Z. Xiong
    A variational approach to JPEG anti-forensics
    2013 IEEE International Conference on Acoustics, Speech and Signal Processing
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/ICASSP.2013.6638220
    BibTeX
    @inproceedings{Fan2013,
     author = {Fan, Wei and Wang, Kai and Cayre, François and Xiong, Zhang},
     title = {A variational approach to JPEG anti-forensics},
     booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  75. F. Farhadzadeh, S. Voloshynovskiy, T. Holotyak & F. Beekhof
    Active Content Fingerprinting: Shrinkage And Lattice Based Modulations
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638223
    BibTeX
    @inproceedings{Farhadzadeh2013,
     author = {Farzad Farhadzadeh and Sviatoslav Voloshynovskiy and Taras Holotyak and Fokko Beekhof},
     title = {Active Content Fingerprinting: Shrinkage And Lattice Based Modulations},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  76. P. Ferrara, T. Bianchi, A. De Rosa & A. Piva
    Detection and estimation of contrast enhancement in double compressed images
    Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
    2013
    BibTeX
    @inproceedings{Ferrara2013,
     author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro},
     title = {Detection and estimation of contrast enhancement in double compressed images},
     booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)},
     year = {2013}}
    
  77. P. Ferrara, T. Bianchi, A. De Rosa & A. Piva
    Reverse engineering of double compressed images in the presence of contrast enhancement
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 141-146
    DOI: 10.1109/MMSP.2013.6659278
    BibTeX
    @inproceedings{Ferrara2013a,
     author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro},
     title = {Reverse engineering of double compressed images in the presence of contrast enhancement},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {141--146}}
    
  78. A. Fischer & T. Gloe
    Forensic analysis of interdependencies between vignetting and radial lens distortion
    IS&T/SPIE Electronic Imaging
    2013, pp. 86650D-86650D
    BibTeX
    @inproceedings{Fischer2013,
     author = {Fischer, André and Gloe, Thomas},
     title = {Forensic analysis of interdependencies between vignetting and radial lens distortion},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {86650D--86650D}}
    
  79. M. Fontani
    A Forensic Tool for Investigating Image Forgeries
    International Journal of Digital Crime and Forensics (IJDCF), IGI Global, 2013, Vol. 5(4), pp. 15-33
    DOI: 10.4018/ijdcf.2013100102
    BibTeX
    @article{Fontani2013a,
     author = {Marco Fontani},
     title = {A Forensic Tool for Investigating Image Forgeries},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     publisher = {IGI Global},
     year = {2013},
     volume = {5},
     number = {4},
     pages = {15--33}}
    
  80. M. Fontani, E. Argones-Rua, C. Troncoso & M. Barni
    The watchful forensic analyst: Multi-clue information fusion with background knowledge
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 120-125
    DOI: 10.1109/WIFS.2013.6707805
    BibTeX
    @inproceedings{Fontani2013b,
     author = {Fontani, M. and Argones-Rua, E. and Troncoso, C. and Barni, M.},
     title = {The watchful forensic analyst: Multi-clue information fusion with background knowledge},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {120--125}}
    
  81. M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence
    IEEE Transactions on Information Forensics and Security, 2013, Vol. -, pp. -
    DOI: 10.1109/TIFS.2013.2248727
    BibTeX
    @article{Fontani2013,
     author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.},
     title = {A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {-},
     pages = {-}}
    
  82. J. Fridrich
    Sensor Defects in Digital Image Forensic
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer Science mathplus Business Media, 2013, pp. 179-218
    DOI: 10.1007/978-1-4614-0757-7_6
    BibTeX
    @incollection{Fridrich2013,
     author = {Jessica Fridrich},
     title = {Sensor Defects in Digital Image Forensic},
     booktitle = {Digital Image Forensics},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     pages = {179--218}}
    
  83. F. Galvan, G. Puglisi, A. Bruna & S. Battiato
    First Quantization Coefficient Extraction from Double Compressed JPEG Images
    Petrosino, A. (ed.)
    Image Analysis and Processing -- ICIAP 2013
    Springer Berlin Heidelberg, 2013, Vol. 8156, pp. 783-792
    DOI: 10.1007/978-3-642-41181-6_79
    BibTeX
    @incollection{Galvan2013,
     author = {Galvan, Fausto and Puglisi, Giovanni and Bruna, ArcangeloR. and Battiato, Sebastiano},
     title = {First Quantization Coefficient Extraction from Double Compressed JPEG Images},
     booktitle = {Image Analysis and Processing -- ICIAP 2013},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {8156},
     pages = {783--792}}
    
  84. Y. Gan & J. Cang
    A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA
    Sensors & Transducers, 2013, Vol. 159(11), pp. 19-25
    BibTeX
    @article{Gan2013,
     author = {Yanfen Gan and Jing Cang},
     title = {A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA},
     journal = {Sensors & Transducers},
     year = {2013},
     volume = {159},
     number = {11},
     pages = {19--25}}
    
  85. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Sanches, J., Micó, L. & Cardoso, J. (ed.)
    Pattern Recognition and Image Analysis
    Springer Science mathplus Business Media, 2013, Vol. 7887, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @incollection{Garcia-Ordas2013,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     volume = {7887},
     pages = {416--423}}
    
  86. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Pattern Recognition and Image Analysis
    Springer, 2013, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @incollection{Garcia-Ordas2013a,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2013},
     pages = {416--423}}
    
  87. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Pattern Recognition and Image Analysis
    Pattern Recognition and Image Analysis, Springer, 2013, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @article{Garcia-Ordas2013b,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2013},
     pages = {416--423}}
    
  88. F. Gisolf, Z. Geradts, D. Verhoeven & C. Klaver
    The effects of switching the camera module from BlackBerry Curve 9360 devices
    Digital Investigation, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.diin.2013.01.007
    BibTeX
    @article{Gisolf2013a,
     author = {Floris Gisolf and Zeno Geradts and Dennie Verhoeven and Coert Klaver},
     title = {The effects of switching the camera module from BlackBerry Curve 9360 devices},
     journal = {Digital Investigation},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  89. F. Gisolf, A. Malgoezar, T. Baar & Z. Geradts
    Improving source camera identification using a simplified total variation based noise removal algorithm
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.08.002
    BibTeX
    @article{Gisolf2013,
     author = {Floris Gisolf and Anwar Malgoezar and Teun Baar and Zeno Geradts},
     title = {Improving source camera identification using a simplified total variation based noise removal algorithm},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  90. U.M. Gokhale & Y.V.Joshi
    Noise Estimation Using Filtering and SVD for Image Tampering Detection
    International Journal of Engineering Science and Innovative Technology (IJESIT), 2013
    BibTeX
    @article{Gokhale2013,
     author = {U. M. Gokhale and Y.V.Joshi},
     title = {Noise Estimation Using Filtering and SVD for Image Tampering Detection},
     journal = {International Journal of Engineering Science and Innovative Technology (IJESIT)},
     year = {2013}}
    
  91. M. Goljan & J. Fridrich
    Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images
    Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2013
    BibTeX
    @techreport{Goljan2013,
     author = {Goljan, Miroslav and Fridrich, Jessica},
     title = {Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images},
     school = {Department of ECE, SUNY Binghamton, NY, USA},
     year = {2013}}
    
  92. M.E. Graves
    Forensic Video Analysis
    Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
    2013, pp. 638-651
    BibTeX
    @inproceedings{Graves2013,
     author = {Matthew E. Graves},
     title = {Forensic Video Analysis},
     booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon},
     year = {2013},
     pages = {638--651}}
    
  93. A. Gupta, N. Saxena & S. Vasistha
    Detecting Copy Move Forgery In Digital Images
    International Journal of Engineering Research and Applications (IJERA), 2013, Vol. 3(4), pp. 94-97
    BibTeX
    @article{Gupta2013,
     author = {Ashima Gupta and Nisheeth Saxena and S.K. Vasistha},
     title = {Detecting Copy Move Forgery In Digital Images},
     journal = {International Journal of Engineering Research and Applications (IJERA)},
     year = {2013},
     volume = {3},
     number = {4},
     pages = {94--97}}
    
  94. A. Gupta, N. Saxena & S. Vasistha
    Detecting Copy move Forgery using DCT
    International Journal of Scientific and Research Publications, 2013
    BibTeX
    @article{Gupta2013a,
     author = {Ashima Gupta and Nisheeth Saxena and S.K Vasistha},
     title = {Detecting Copy move Forgery using DCT},
     journal = {International Journal of Scientific and Research Publications},
     year = {2013}}
    
  95. S. Gupta & P.S. Sandhu
    Document Forgery: The State of Art
    International Journal of Research in Engineering and Technology (IJRET), 2013
    BibTeX
    @article{Gupta2013b,
     author = {Surbhi Gupta and Parvinder S. Sandhu},
     title = {Document Forgery: The State of Art},
     journal = {International Journal of Research in Engineering and Technology (IJRET)},
     year = {2013}}
    
  96. K. Hara, K. Inoue & K. Urahama
    Generalized Mixture Ratio Based Blind Image Separation
    Signal Processing Letters, IEEE, 2013, Vol. 20(8), pp. 743-746
    DOI: 10.1109/LSP.2013.2265274
    BibTeX
    @article{Hara2013,
     author = {Hara, K. and Inoue, K. and Urahama, K.},
     title = {Generalized Mixture Ratio Based Blind Image Separation},
     journal = {Signal Processing Letters, IEEE},
     year = {2013},
     volume = {20},
     number = {8},
     pages = {743--746}}
    
  97. M. Hashmi, A. Hambarde & A. Keskar
    Copy move forgery detection using DWT and SIFT features
    Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on
    2013, pp. 188-193
    DOI: 10.1109/ISDA.2013.6920733
    BibTeX
    @inproceedings{Hashmi2013,
     author = {Hashmi, M.F. and Hambarde, A.R. and Keskar, A.G.},
     title = {Copy move forgery detection using DWT and SIFT features},
     booktitle = {Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on},
     year = {2013},
     pages = {188--193}}
    
  98. He
    Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method
    Information Technology Journal, 2013, Vol. 12(14), pp. 2975-2979
    BibTeX
    @article{He2013,
     author = {He},
     title = {Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method},
     journal = {Information Technology Journal},
     year = {2013},
     volume = {12},
     number = {14},
     pages = {2975--2979}}
    
  99. P.D. Hiscocks
    Measuring Luminance with a Digital Camera: Case History
    Syscomp Electronic Design Limited, Syscomp Electronic Design Limited, 2013
    BibTeX
    @techreport{Hiscocks2013,
     author = {Peter D. Hiscocks},
     title = {Measuring Luminance with a Digital Camera: Case History},
     school = {Syscomp Electronic Design Limited},
     year = {2013}}
    
  100. J. Hou, H. Shi, Y. Cheng & R. Li
    Fogery image splicing detection by abnormal prediction features
    Mechatronics and Automation (ICMA), 2013 IEEE International Conference on
    2013, pp. 1394-1398
    DOI: 10.1109/ICMA.2013.6618117
    BibTeX
    @inproceedings{Hou2013a,
     author = {Jun Hou and Shi, Haojie and Cheng, Yan and Li, Ran},
     title = {Fogery image splicing detection by abnormal prediction features},
     booktitle = {Mechatronics and Automation (ICMA), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1394--1398}}
    
  101. X. Hou, T. Zhang, G. Xiong, Y. Zhang & X. Ping
    Image resampling detection based on texture classification
    Multimedia Tools and Applications, Springer US, 2013, pp. 1-28
    DOI: 10.1007/s11042-013-1466-0
    BibTeX
    @article{Hou2013,
     author = {Hou, Xiaodan and Zhang, Tao and Xiong, Gang and Zhang, Yan and Ping, Xin},
     title = {Image resampling detection based on texture classification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2013},
     pages = {1--28}}
    
  102. P. Hrudya, L. Nair, S. Adithya, R. Unni, V. Priya & P. Poornachandran
    Digital image forgery detection on artificially blurred images
    Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on
    2013, pp. 1-5
    DOI: 10.1109/C2SPCA.2013.6749392
    BibTeX
    @inproceedings{Hrudya2013,
     author = {Hrudya, P. and Nair, L.S. and Adithya, S.M. and Unni, R. and Priya, V.H. and Poornachandran, P.},
     title = {Digital image forgery detection on artificially blurred images},
     booktitle = {Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on},
     year = {2013},
     pages = {1--5}}
    
  103. C.-J. Hsieh, C.-T. Weng & J.-S. Li
    JPEG forensics scheme for signature embedding and packet-level detection
    International Journal of Communication Systems, 2013, pp. n/a-n/a
    DOI: 10.1002/dac.2547
    BibTeX
    @article{Hsieh2013,
     author = {Hsieh, Che-Jen and Weng, Chi-Tien and Li, Jung-Shian},
     title = {JPEG forensics scheme for signature embedding and packet-level detection},
     journal = {International Journal of Communication Systems},
     year = {2013},
     pages = {n/a--n/a}}
    
  104. W. Huang & X. Han
    An Improved RANSAC Algorithm of Color Image Stitching
    Proceedings of 2013 Chinese Intelligent Automation Conference
    Springer, 2013
    DOI: 10.1007/978-3-642-38466-0_3
    BibTeX
    @incollection{Huang2013,
     author = {Huang, Weijie and Han, Xiaowei},
     title = {An Improved RANSAC Algorithm of Color Image Stitching},
     booktitle = {Proceedings of 2013 Chinese Intelligent Automation Conference},
     publisher = {Springer},
     year = {2013}}
    
  105. M. Hussain, G. Muhammad, S.Q. Saleh, A.M. Mirza & G. Bebis
    Image forgery detection using multi-resolution Weber local descriptors
    EUROCON, 2013 IEEE
    2013, pp. 1570-1577
    DOI: 10.1109/EUROCON.2013.6625186
    BibTeX
    @inproceedings{Hussain2013,
     author = {Hussain, M. and Muhammad, G. and Saleh, S. Q. and Mirza, A. M. and Bebis, G.},
     title = {Image forgery detection using multi-resolution Weber local descriptors},
     booktitle = {EUROCON, 2013 IEEE},
     year = {2013},
     pages = {1570--1577}}
    
  106. M.G. Hwang, H.J. Park & D.H. Har
    Source camera identification based on interpolation via lens distortion correction
    Australian Journal of Forensic Sciences, 2013, Vol. 0(0), pp. 1-13
    DOI: 10.1080/00450618.2013.804946
    BibTeX
    @article{Hwang2013,
     author = {Hwang, Min Gu and Park, Hyung Ju and Har, Dong Hwan},
     title = {Source camera identification based on interpolation via lens distortion correction},
     journal = {Australian Journal of Forensic Sciences},
     year = {2013},
     volume = {0},
     number = {0},
     pages = {1--13}}
    
  107. D.-K. Hyun, M.-J. Lee, S.-J. Ryu, H.-Y. Lee & H.-K. Lee
    Forgery Detection for Surveillance Video
    The Era of Interactive Media
    Springer New York, 2013, pp. 25-36
    DOI: 10.1007/978-1-4614-3501-3_3
    BibTeX
    @incollection{Hyun2013,
     author = {Hyun, Dai-Kyung and Lee, Min-Jeong and Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-Kyu},
     title = {Forgery Detection for Surveillance Video},
     booktitle = {The Era of Interactive Media},
     publisher = {Springer New York},
     year = {2013},
     pages = {25--36}}
    
  108. D.-K. Hyun, S.-J. Ryu, H.-Y. Lee & H.-K. Lee
    Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise
    Sensors, 2013, pp. 12605-12631
    DOI: 10.3390/s130912605
    BibTeX
    @article{Hyun2013a,
     author = {Dai-Kyung Hyun and Seung-Jin Ryu and Hae-Yeoun Lee and Heung-Kyu Lee},
     title = {Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise},
     journal = {Sensors},
     year = {2013},
     pages = {12605--12631}}
    
  109. M.B. Imamoglu, G. Ulutas & M. Ulutas
    Detection of copy-move forgery using Krawtchouk moment
    Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on
    2013, pp. 311-314
    DOI: 10.1109/ELECO.2013.6713851
    BibTeX
    @inproceedings{Imamoglu2013,
     author = {Imamoglu, Mustafa Bilgehan and Ulutas, Guzin and Ulutas, Mustafa},
     title = {Detection of copy-move forgery using Krawtchouk moment},
     booktitle = {Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on},
     year = {2013},
     pages = {311--314}}
    
  110. M. Jaberi, G. Bebis, M. Hussain & G. Muhammad
    Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery
    Machine Vision and Applications, 2013, Vol. 25(2), pp. 451-457
    DOI: 10.1007/s00138-013-0522-0
    BibTeX
    @article{Jaberi2013,
     author = {Maryam Jaberi and George Bebis and Muhammad Hussain and Ghulam Muhammad},
     title = {Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery},
     journal = {Machine Vision and Applications},
     year = {2013},
     volume = {25},
     number = {2},
     pages = {451--457}}
    
  111. M. Jaberi, G. Bebis, M. Hussain & G. Muhammad
    Improving the detection and localization of duplicated regions in copy-move image forgery
    Digital Signal Processing (DSP), 2013 18th International Conference on
    2013, pp. 1-6
    DOI: 10.1109/ICDSP.2013.6622700
    BibTeX
    @inproceedings{Jaberi2013a,
     author = {Jaberi, M. and Bebis, G. and Hussain, M. and Muhammad, G.},
     title = {Improving the detection and localization of duplicated regions in copy-move image forgery},
     booktitle = {Digital Signal Processing (DSP), 2013 18th International Conference on},
     year = {2013},
     pages = {1--6}}
    
  112. Y. Jiang, H. Zeng, X. Kang & L. Liu
    The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation
    Proceedings of the APSIPA
    2013
    BibTeX
    @inproceedings{Jiang2013,
     author = {Yunwen Jiang and Hui Zeng and Xiangui Kang and Li Liu},
     title = {The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation},
     booktitle = {Proceedings of the APSIPA},
     year = {2013}}
    
  113. M.K. Johnson
    Detecting Doctored Images
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 257-274
    BibTeX
    @incollection{Johnson2013,
     author = {Johnson, Micah K},
     title = {Detecting Doctored Images},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {257--274}}
    
  114. K.Karthikeyan & R. Lakshmi
    Fuzzy based Image Forgery Localization Using Blocking Artifacts
    International Journal of New Trends in Electronics and Communication (IJNTEC), 2013, Vol. 1(1), pp. 18 - 20
    BibTeX
    @article{Karthikeyan2013,
     author = {K.Karthikeyan and R.Sowmya Lakshmi},
     title = {Fuzzy based Image Forgery Localization Using Blocking Artifacts},
     journal = {International Journal of New Trends in Electronics and Communication (IJNTEC)},
     year = {2013},
     volume = {1},
     number = {1},
     pages = {18 -- 20}}
    
  115. A.B. Kaimal, S. Manimurugan & J. Anitha
    A modified anti-forensic technique for removing detectable traces from digital images
    Proc. Int Computer Communication and Informatics (ICCCI) Conf
    2013, pp. 1-4
    DOI: 10.1109/ICCCI.2013.6466109
    BibTeX
    @inproceedings{Kaimal2013,
     author = {Kaimal, Athira B. and Manimurugan, S. and Anitha, J.},
     title = {A modified anti-forensic technique for removing detectable traces from digital images},
     booktitle = {Proc. Int Computer Communication and Informatics (ICCCI) Conf},
     year = {2013},
     pages = {1--4}}
    
  116. A.B. Kaimal, S. Manimurugan, J. Rajivkumar & Anitha
    A new technique for removing forensically detectable traces from digital images
    Proc. 7th Int Intelligent Systems and Control (ISCO) Conf
    2013, pp. 321-324
    DOI: 10.1109/ISCO.2013.6481171
    BibTeX
    @inproceedings{Kaimal2013a,
     author = {Kaimal, Athira B. and Manimurugan, S. and Rajivkumar, J. and Anitha},
     title = {A new technique for removing forensically detectable traces from digital images},
     booktitle = {Proc. 7th Int Intelligent Systems and Control (ISCO) Conf},
     year = {2013},
     pages = {321--324}}
    
  117. X. Kang, M. Stamm, A. Peng & K. Liu
    Robust Median Filtering Forensics Using an Autoregressive Model
    Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1456-1468
    DOI: 10.1109/TIFS.2013.2273394
    BibTeX
    @article{Kang2013,
     author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.},
     title = {Robust Median Filtering Forensics Using an Autoregressive Model},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2013},
     volume = {8},
     number = {9},
     pages = {1456--1468}}
    
  118. A. Kashyap & S.D. Joshi
    Detection of copy-move forgery using wavelet decomposition
    Signal Processing and Communication (ICSC), 2013 International Conference on
    2013, pp. 396-400
    DOI: 10.1109/ICSPCom.2013.6719820
    BibTeX
    @inproceedings{Kashyap2013,
     author = {Kashyap, Abhishek and Joshi, Shiv Dutt},
     title = {Detection of copy-move forgery using wavelet decomposition},
     booktitle = {Signal Processing and Communication (ICSC), 2013 International Conference on},
     year = {2013},
     pages = {396--400}}
    
  119. Y. Ke, Q. Shan, F. Qin & W. Min
    Image Recapture Detection Using Multiple Features
    International Journal of Multimedia and Ubiquitous Engineering, 2013
    BibTeX
    @article{Ke2013,
     author = {Yongzhen Ke and Qingqing Shan and Fan Qin and Weidong Min},
     title = {Image Recapture Detection Using Multiple Features},
     journal = {International Journal of Multimedia and Ubiquitous Engineering},
     year = {2013}}
    
  120. E. Kee, J. O'brien & H. Farid
    Exposing photo manipulation with inconsistent shadows
    ACM Trans. Graph., ACM, 2013, Vol. 32(3), pp. 28:1-28:12
    DOI: 10.1145/2487228.2487236
    BibTeX
    @article{Kee2013,
     author = {Kee, Eric and O'brien, James and Farid, Hany},
     title = {Exposing photo manipulation with inconsistent shadows},
     journal = {ACM Trans. Graph.},
     publisher = {ACM},
     year = {2013},
     volume = {32},
     number = {3},
     pages = {28:1--28:12}}
    
  121. S. Ketenci & G. Ulutas
    Copy-move forgery detection in images via 2D-Fourier Transform
    Telecommunications and Signal Processing (TSP), 2013 36th International Conference on
    2013, pp. 813-816
    DOI: 10.1109/TSP.2013.6614051
    BibTeX
    @inproceedings{Ketenci2013,
     author = {Ketenci, S. and Ulutas, G.},
     title = {Copy-move forgery detection in images via 2D-Fourier Transform},
     booktitle = {Telecommunications and Signal Processing (TSP), 2013 36th International Conference on},
     year = {2013},
     pages = {813--816}}
    
  122. M. Kirchner, P. Winkler & H. Farid
    Impeding forgers at photo inception
    IS&T/SPIE Electronic Imaging
    2013, pp. 866504-866504
    BibTeX
    @inproceedings{Kirchner2013,
     author = {Kirchner, Matthias and Winkler, Peter and Farid, Hany},
     title = {Impeding forgers at photo inception},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {866504--866504}}
    
  123. A.C. Kot & H. Cao
    Image and Video Source Class Identi�?cation
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 157-179
    BibTeX
    @incollection{Kot2013,
     author = {Alex C. Kot and Hong Cao},
     title = {Image and Video Source Class Identi�?cation},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {157--179}}
    
  124. S. Kumar, J. Desai & S. Mukherjee
    A fast DCT based method for copy move forgery detection
    Image Information Processing (ICIIP), 2013 IEEE Second International Conference on
    2013, pp. 649-654
    DOI: 10.1109/ICIIP.2013.6707675
    BibTeX
    @inproceedings{Kumar2013a,
     author = {Kumar, Sunil and Desai, Jagannath and Mukherjee, Shaktidev},
     title = {A fast DCT based method for copy move forgery detection},
     booktitle = {Image Information Processing (ICIIP), 2013 IEEE Second International Conference on},
     year = {2013},
     pages = {649--654}}
    
  125. S. Kumar, J. Desai, S. Mukherjee & P. Das
    Suitability of Independent Component Analysis in Digital Image Forgery Detection
    International Journal of Engineering and Technology, 2013, Vol. 5, pp. -
    BibTeX
    @article{Kumar2013,
     author = {Kumar, Sunil and Desai, JV and Mukherjee, S and Das, PK},
     title = {Suitability of Independent Component Analysis in Digital Image Forgery Detection},
     journal = {International Journal of Engineering and Technology},
     year = {2013},
     volume = {5},
     pages = {-}}
    
  126. T.-Y. Kuo, Y.-C. Lo & S.-N. Huang
    Image forgery detection for region duplication tampering
    Multimedia and Expo (ICME), 2013 IEEE International Conference on
    2013, pp. 1-6
    DOI: 10.1109/ICME.2013.6607452
    BibTeX
    @inproceedings{Kuo2013,
     author = {Tien-Ying Kuo and Yi-Chung Lo and Ssu-Neng Huang},
     title = {Image forgery detection for region duplication tampering},
     booktitle = {Multimedia and Expo (ICME), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1--6}}
    
  127. K. Kurosawa, K. Kuroki, K. Tsuchiya, N. Igarashi & N. Akiba
    Case studies and further improvements on source camera identification
    IS&T/SPIE Electronic Imaging
    2013, pp. 86650C-86650C
    BibTeX
    @inproceedings{Kurosawa2013,
     author = {Kurosawa, Kenji and Kuroki, Kenro and Tsuchiya, Ken�ichi and Igarashi, Naoaki and Akiba, Norimitsu},
     title = {Case studies and further improvements on source camera identification},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {86650C--86650C}}
    
  128. D. Labartino, T. Bianchi, A.D. Rosa, M. Fontani, D. Vazquez-Padın, A. Piva & M. Barni
    Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis
    Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
    2013
    DOI: 10.1109/mmsp.2013.6659338
    BibTeX
    @inproceedings{Labartino2013,
     author = {D. Labartino and T. Bianchi and A. De Rosa and M. Fontani and D. Vazquez-Padın and A. Piva and M. Barni},
     title = {Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis},
     booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)},
     year = {2013}}
    
  129. S. Lai & R. Böhme
    Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3028-3032
    DOI: 10.1109/icassp.2013.6638214
    BibTeX
    @inproceedings{Lai2013,
     author = {Lai, ShiYue and Böhme, Rainer},
     title = {Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013},
     pages = {3028--3032}}
    
  130. L. Laijie, Y. Gaobo & X. Ming
    Anti-Forensics for Unsharp Masking Sharpening in Digital Images
    International Journal of Digital Crime and Forensics (IJDCF), 2013, Vol. 5(3)
    DOI: 10.4018/jdcf.2013070104
    BibTeX
    @article{Laijie2013,
     author = {Lu Laijie and Yang Gaobo and Xia Ming},
     title = {Anti-Forensics for Unsharp Masking Sharpening in Digital Images},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2013},
     volume = {5},
     number = {3}}
    
  131. M Lalitha, H. Holalad, S. Rajput, D Muktanidhi S & U. Mudenagudi
    A classifier framework for the detection of doctored images
    Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
    2013, pp. 1-4
    DOI: 10.1109/NCVPRIPG.2013.6776155
    BibTeX
    @inproceedings{Lalitha2013a,
     author = {Lalitha M and H. Holalad and S. Rajput and Muktanidhi S D and U. Mudenagudi},
     title = {A classifier framework for the detection of doctored images},
     booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)},
     year = {2013},
     pages = {1--4}}
    
  132. M. Lalitha, H. Holalad, S. Rajput, S. Muktanidhi & U. Mudenagudi
    A classifier framework for the detection of doctored images
    Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on
    2013, pp. 1-4
    DOI: 10.1109/NCVPRIPG.2013.6776155
    BibTeX
    @inproceedings{Lalitha2013,
     author = {Lalitha, M. and Holalad, H. and Rajput, S. and Muktanidhi, S.D. and Mudenagudi, U.},
     title = {A classifier framework for the detection of doctored images},
     booktitle = {Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on},
     year = {2013},
     pages = {1--4}}
    
  133. A. Lawgaly, F. Khelifi & A. Bouridane
    Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation
    Emerging Security Technologies (EST), 2013 Fourth International Conference on
    2013, pp. 113-116
    DOI: 10.1109/EST.2013.25
    BibTeX
    @inproceedings{Lawgaly2013,
     author = {Lawgaly, A. and Khelifi, F. and Bouridane, A.},
     title = {Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation},
     booktitle = {Emerging Security Technologies (EST), 2013 Fourth International Conference on},
     year = {2013},
     pages = {113--116}}
    
  134. L. Li, S. Li, H. Zhu, S.-C. Chu, J.F. Roddick & J.-S. Pan
    An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns
    Journal of Information Hiding and Multimedia Signal Processing, 2013, Vol. 4(1)
    BibTeX
    @article{Li2013e,
     author = {Leida Li and Shushang Li and Hancheng Zhu and Shu-Chuan Chu and John F. Roddick and Jeng-Shyang Pan},
     title = {An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2013},
     volume = {4},
     number = {1}}
    
  135. L. Li, J. Xue, X. Wang & L. Tian
    A robust approach to detect digital forgeries by exploring correlation patterns
    Pattern Analysis and Applications, Springer-Verlag, 2013, Vol. -, pp. 1-15
    DOI: 10.1007/s10044-013-0319-9
    BibTeX
    @article{Li2013,
     author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua},
     title = {A robust approach to detect digital forgeries by exploring correlation patterns},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer-Verlag},
     year = {2013},
     volume = {-},
     pages = {1--15}}
    
  136. L. Li, W. Zhang, S. Li & J.S. Pan
    Detection of Region Duplication Forgery in Images under Affine Transforms
    Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf
    2013, pp. 543-546
    DOI: 10.1109/IIH-MSP.2013.140
    BibTeX
    @inproceedings{Li2013f,
     author = {L. Li and W. Zhang and S. Li and J. S. Pan},
     title = {Detection of Region Duplication Forgery in Images under Affine Transforms},
     booktitle = {Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf},
     year = {2013},
     pages = {543--546}}
    
  137. Q. Li
    Searching and Extracting Digital Image Evidence
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 123-156
    BibTeX
    @incollection{Li2013a,
     author = {Qiming Li},
     title = {Searching and Extracting Digital Image Evidence},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {123--156}}
    
  138. X. Li, X.J. Shen, Y.D. Lv & H.P. Chen
    Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection
    Applied Mechanics and Materials, 2013, Vol. 385 - 386, pp. 1466-1469
    BibTeX
    @article{Li2013c,
     author = {Xiang Li and Xuan Jing Shen and Ying Da Lv and Hai Peng Chen},
     title = {Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection},
     journal = {Applied Mechanics and Materials},
     year = {2013},
     volume = {385 - 386},
     pages = {1466--1469}}
    
  139. Y. Li
    Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
    Forensic Science International, Elsevier BV, 2013, Vol. 224(1-3), pp. 59-67
    DOI: 10.1016/j.forsciint.2012.10.031
    BibTeX
    @article{Li2013d,
     author = {Yuenan Li},
     title = {Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2013},
     volume = {224},
     number = {1-3},
     pages = {59--67}}
    
  140. Z. Li, J. Ye & Y. Shi
    Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 228-241
    DOI: 10.1007/978-3-642-40099-5_19
    BibTeX
    @incollection{Li2013b,
     author = {Li, Zhaohong and Ye, Jingyu and Shi, YunQing},
     title = {Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {228--241}}
    
  141. Y.Y. Liang & Y. Wang
    A splicing image detecting metheod based on original image estimation
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013
    DOI: 10.2991/iccsee.2013.143
    BibTeX
    @inproceedings{Liang2013,
     author = {Yun Yi Liang and Ying Wang},
     title = {A splicing image detecting metheod based on original image estimation},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013}}
    
  142. S.-Y. Liao & T.-Q. Huang
    Video copy-move forgery detection and localization based on Tamura texture features
    Image and Signal Processing (CISP), 2013 6th International Congress on
    2013, Vol. 2, pp. 864-868
    DOI: 10.1109/CISP.2013.6745286
    BibTeX
    @inproceedings{Liao2013,
     author = {Sheng-Yang Liao and Tian-Qiang Huang},
     title = {Video copy-move forgery detection and localization based on Tamura texture features},
     booktitle = {Image and Signal Processing (CISP), 2013 6th International Congress on},
     year = {2013},
     volume = {2},
     pages = {864--868}}
    
  143. C.-S. Lin & J.-J. Tsay
    Passive Approach for Video Forgery Detection and Localization
    Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong
    2013, pp. 107-112
    BibTeX
    @inproceedings{Lin2013,
     author = {Cheng-Shain Lin and Jyh-Jong Tsay},
     title = {Passive Approach for Video Forgery Detection and Localization},
     booktitle = {Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong},
     year = {2013},
     pages = {107--112}}
    
  144. X. Lin, C. Li & Y. Hu
    Exposing Image Forgery Through the Detection of Contrast Enhancement
    ICIP
    2013
    BibTeX
    @inproceedings{Lin2013a,
     author = {X Lin and CT Li and Y Hu},
     title = {Exposing Image Forgery Through the Detection of Contrast Enhancement},
     booktitle = {ICIP},
     year = {2013}}
    
  145. B. Liu & C.-M. Pun
    A SIFT and local features based integrated method for copy-move attack detection in digital image
    Information and Automation (ICIA), 2013 IEEE International Conference on
    2013, pp. 865-869
    DOI: 10.1109/ICInfA.2013.6720415
    BibTeX
    @inproceedings{Liu2013b,
     author = {Bo Liu and Chi-Man Pun},
     title = {A SIFT and local features based integrated method for copy-move attack detection in digital image},
     booktitle = {Information and Automation (ICIA), 2013 IEEE International Conference on},
     year = {2013},
     pages = {865--869}}
    
  146. Q. Liu, P. Cooper, L. Chen, H. Cho, Z. Chen, M. Qiao, Y. Su, M. Wei & A. Sung
    Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation
    Applied Intelligence, Springer US, 2013, pp. 1-22
    DOI: 10.1007/s10489-013-0430-z
    BibTeX
    @article{Liu2013a,
     author = {Liu, Qingzhong and Cooper, PeterA. and Chen, Lei and Cho, Hyuk and Chen, Zhongxue and Qiao, Mengyu and Su, Yuting and Wei, Mingzhen and Sung, AndrewH.},
     title = {Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation},
     journal = {Applied Intelligence},
     publisher = {Springer US},
     year = {2013},
     pages = {1--22}}
    
  147. X. Liu, F. Li & L. Xiang
    Copy-Move Forgery Detection Using the MROGH
    Journal of Computational Information Systems, 2013, Vol. 9(3), pp. 1071-1078
    BibTeX
    @article{Liu2013,
     author = {Liu, Xiaoxia and Li, Feng and Xiang, Lingyun},
     title = {Copy-Move Forgery Detection Using the MROGH},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {3},
     pages = {1071--1078}}
    
  148. J. Lopez-Moreno, E. Garces, S. Hadap, E. Reinhard & D. Gutierrez
    Multiple Light Source Estimation in a Single Image
    Computer Graphics Forum, 2013, pp. n/a-n/a
    DOI: 10.1111/cgf.12195
    BibTeX
    @article{Lopez-Moreno2013,
     author = {Lopez-Moreno, Jorge and Garces, Elena and Hadap, Sunil and Reinhard, Erik and Gutierrez, Diego},
     title = {Multiple Light Source Estimation in a Single Image},
     journal = {Computer Graphics Forum},
     year = {2013},
     pages = {n/a--n/a}}
    
  149. G. Lynch, F.Y. Shih & H.-Y.M. Liao
    An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection
    Information Sciences, 2013(0), pp. -
    DOI: 10.1016/j.ins.2013.03.028
    BibTeX
    @article{Lynch2013,
     author = {Gavin Lynch and Frank Y. Shih and Hong-Yuan Mark Liao},
     title = {An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection},
     journal = {Information Sciences},
     year = {2013},
     number = {0},
     pages = {-}}
    
  150. S. Lyu
    Natural Image Statistics in Digital Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 239-256
    BibTeX
    @incollection{Lyu2013,
     author = {Siwei Lyu},
     title = {Natural Image Statistics in Digital Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {239--256}}
    
  151. S. Lyu, X. Pan & X. Zhang
    Exposing Region Splicing Forgeries with Blind Local Noise Estimation
    International Journal of Computer Vision, Springer US, 2013, pp. 1-20
    DOI: 10.1007/s11263-013-0688-y
    BibTeX
    @article{Lyu2013a,
     author = {Lyu, Siwei and Pan, Xunyu and Zhang, Xing},
     title = {Exposing Region Splicing Forgeries with Blind Local Noise Estimation},
     journal = {International Journal of Computer Vision},
     publisher = {Springer US},
     year = {2013},
     pages = {1--20}}
    
  152. D. Mahalakshmi, K. Vijayalakshmi & E. Agnes
    A forensic method for detecting image forgery
    Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on
    2013, pp. 590-594
    DOI: 10.1109/ICE-CCN.2013.6528568
    BibTeX
    @inproceedings{Mahalakshmi2013,
     author = {Devi Mahalakshmi and Vijayalakshmi, K. and Agnes, E.},
     title = {A forensic method for detecting image forgery},
     booktitle = {Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on},
     year = {2013},
     pages = {590--594}}
    
  153. B. Mahdian, R. Nedbal & S. Saic
    Blind Verification of Digital Image Originality: A Statistical Approach
    Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1531-1540
    DOI: 10.1109/TIFS.2013.2276000
    BibTeX
    @article{Mahdian2013,
     author = {Mahdian, B. and Nedbal, R. and Saic, S.},
     title = {Blind Verification of Digital Image Originality: A Statistical Approach},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2013},
     volume = {8},
     number = {9},
     pages = {1531--1540}}
    
  154. B. Mahdian & S. Saic
    A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component
    Multimedia (ISM), 2013 IEEE International Symposium on
    2013, pp. 241-247
    DOI: 10.1109/ISM.2013.46
    BibTeX
    @inproceedings{Mahdian2013a,
     author = {Mahdian, B. and Saic, S.},
     title = {A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component},
     booktitle = {Multimedia (ISM), 2013 IEEE International Symposium on},
     year = {2013},
     pages = {241--247}}
    
  155. R.R. Maind, A. Khade & D. Chitre
    Robust Image Copy Move Forgery Detection
    IJAIR, 2013
    BibTeX
    @article{Maind2013,
     author = {Rohini R. Maind and Alka Khade and D.K. Chitre},
     title = {Robust Image Copy Move Forgery Detection},
     journal = {IJAIR},
     year = {2013}}
    
  156. K. Manudhane & M. Bartere
    Methodology for Evidence Reconstruction in Digital Image Forensics
    International Journal of Engineering Research & Technology (IJERT), 2013, Vol. 2(11), pp. 1311-1318
    BibTeX
    @article{Manudhane2013,
     author = {Kalpana Manudhane and M.M. Bartere},
     title = {Methodology for Evidence Reconstruction in Digital Image Forensics},
     journal = {International Journal of Engineering Research & Technology (IJERT)},
     year = {2013},
     volume = {2},
     number = {11},
     pages = {1311--1318}}
    
  157. X. Meng, S. Niu, R. Yan & Y. Li
    Detecting Photographic Cropping Based on Vanishing Points
    Chinese Journal of Electronics, 2013
    BibTeX
    @article{Meng2013,
     author = {Meng, X.. and Niu, S. and Yan, R. and Li, Y.},
     title = {Detecting Photographic Cropping Based on Vanishing Points},
     journal = {Chinese Journal of Electronics},
     year = {2013}}
    
  158. L. Meng-Jiao, N. Shao-Zhang & Z. Jian-Cheng
    Research on Image Detection Algorithm with Markov Process
    Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on
    2013, pp. 238-241
    DOI: 10.1109/IIH-MSP.2013.68
    BibTeX
    @inproceedings{Meng-Jiao2013,
     author = {Li Meng-Jiao and Niu Shao-Zhang and Zou Jian-Cheng},
     title = {Research on Image Detection Algorithm with Markov Process},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on},
     year = {2013},
     pages = {238--241}}
    
  159. R. Mercuri
    Courtroom Considerations in Digital Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 313-326
    BibTeX
    @incollection{Mercuri2013,
     author = {Rebecca Mercuri},
     title = {Courtroom Considerations in Digital Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {313--326}}
    
  160. N. Mettripun, N. Khanna, T. Amornraksa & E.J. Delp
    Partial sharpness index for classifying digital camera and scanned images
    Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on
    2013, pp. 1-5
    DOI: 10.1109/ECTICon.2013.6559643
    BibTeX
    @inproceedings{Mettripun2013,
     author = {Mettripun, Narong and Khanna, Nitin and Amornraksa, Thumrongrat and Delp, Edward J.},
     title = {Partial sharpness index for classifying digital camera and scanned images},
     booktitle = {Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on},
     year = {2013},
     pages = {1--5}}
    
  161. S. Milani, M. Tagliasacchi & S. Tubaro
    Antiforensics attacks to benford´s law for the detection of double compressed images
    2013 IEEE International Conference on Acoustics, Speech and Signal Processing
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/ICASSP.2013.6638219
    BibTeX
    @inproceedings{Milani2013,
     author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Antiforensics attacks to benford´s law for the detection of double compressed images},
     booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  162. A. Mire, S. Dhok, P. Porey & N. Mistry
    Automation of JPEG Ghost Detection using Graph Based Segmentation
    International Journal Of Computational Engineering Research, 2013, Vol. 3(12)
    BibTeX
    @article{Mire2013,
     author = {AV Mire and SB Dhok and PD Porey and NJ Mistry},
     title = {Automation of JPEG Ghost Detection using Graph Based Segmentation},
     journal = {International Journal Of Computational Engineering Research},
     year = {2013},
     volume = {3},
     number = {12}}
    
  163. M. Mishra & F.L.D.M.C. Adhikary
    Digital Image Tamper Detection Techniques - A Comprehensive Study
    International Journal of Computer Science and Business Informatics, 2013
    BibTeX
    @article{Mishra2013a,
     author = {Minati Mishra and Flt. Lt. Dr. M. C. Adhikary},
     title = {Digital Image Tamper Detection Techniques - A Comprehensive Study},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2013}}
    
  164. M. Mishra & M.C. Adhikary
    Region Duplication Forgery Detection Technique based on SURF and HAC
    International Journal of Computer Science and Business Informatics, 2013, Vol. 2(1), pp. 1 - 12
    BibTeX
    @article{Mishra2013,
     author = {Minati Mishra and M. C. Adhikary},
     title = {Region Duplication Forgery Detection Technique based on SURF and HAC},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2013},
     volume = {2},
     number = {1},
     pages = {1 -- 12}}
    
  165. Z. Mohamadian & A.A. Pouyan
    Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions
    Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on
    2013, pp. 455-460
    DOI: 10.1109/UKSim.2013.94
    BibTeX
    @inproceedings{Mohamadian2013,
     author = {Mohamadian, Z. and Pouyan, A. A.},
     title = {Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions},
     booktitle = {Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on},
     year = {2013},
     pages = {455--460}}
    
  166. H. Muammar & P.L. Dragotti
    An investigation into aliasing in images recaptured from an LCD monitor using a digital camera
    Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
    2013, pp. 2242-2246
    DOI: 10.1109/ICASSP.2013.6638053
    BibTeX
    @inproceedings{Muammar2013,
     author = {H. Muammar and P. L. Dragotti},
     title = {An investigation into aliasing in images recaptured from an LCD monitor using a digital camera},
     booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics},
     year = {2013},
     pages = {2242--2246}}
    
  167. G. Muhammad
    Multi-scale local texture descriptor for image forgery detection
    Industrial Technology (ICIT), 2013 IEEE International Conference on
    2013, pp. 1146-1151
    DOI: 10.1109/ICIT.2013.6505834
    BibTeX
    @inproceedings{Muhammad2013,
     author = {Muhammad, Ghulam},
     title = {Multi-scale local texture descriptor for image forgery detection},
     booktitle = {Industrial Technology (ICIT), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1146--1151}}
    
  168. G. Muhammad, M. Al-Hammadi, M. Hussain & G. Bebis
    Image forgery detection using steerable pyramid transform and local binary pattern
    Machine Vision and Applications, Springer Berlin Heidelberg, 2013, pp. 1-11
    DOI: 10.1007/s00138-013-0547-4
    BibTeX
    @article{Muhammad2013a,
     author = {Muhammad, Ghulam and Al-Hammadi, MunnerH. and Hussain, Muhammad and Bebis, George},
     title = {Image forgery detection using steerable pyramid transform and local binary pattern},
     journal = {Machine Vision and Applications},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     pages = {1--11}}
    
  169. G. Muhammad, M.H. Al-Hammadi, M. Hussain, A.M. Mirza & G. Bebis
    Copy move image forgery detection method using steerable pyramid transform and texture descriptor
    EUROCON, 2013 IEEE
    2013, pp. 1586-1592
    DOI: 10.1109/EUROCON.2013.6625188
    BibTeX
    @inproceedings{Muhammad2013b,
     author = {Muhammad, G and Al-Hammadi, M. H. and Hussain, M. and Mirza, A. M. and Bebis, G.},
     title = {Copy move image forgery detection method using steerable pyramid transform and texture descriptor},
     booktitle = {EUROCON, 2013 IEEE},
     year = {2013},
     pages = {1586--1592}}
    
  170. G. Muhammad & M. Hussain
    Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments
    INFORMATION, 2013, Vol. 16(5), pp. 2957-2964
    BibTeX
    @article{Muhammad2013c,
     author = {Ghulam Muhammad and Muhammad Hussain},
     title = {Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments},
     journal = {INFORMATION},
     year = {2013},
     volume = {16},
     number = {5},
     pages = {2957--2964}}
    
  171. S. Murali, G. Chittapur & H. Prabhakara
    Detection of Digital Photo Image Forgery Using Copy-Create Techniques
    Mohan, S. & Kumar, S. S. (ed.)
    Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)
    Springer India, 2013, Vol. 221, pp. 281-290
    DOI: 10.1007/978-81-322-0997-3_26
    BibTeX
    @incollection{Murali2013,
     author = {Murali, S. and Chittapur, GovndrajB. and Prabhakara, H.S.},
     title = {Detection of Digital Photo Image Forgery Using Copy-Create Techniques},
     booktitle = {Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)},
     publisher = {Springer India},
     year = {2013},
     volume = {221},
     pages = {281--290}}
    
  172. S. Murali, G.B. Chittapur, B.S. Anami & others
    Comparision and analysis of photo image forgery detection techniques
    International Journal on Computational Sciences & Applications (IJCSA), 2013, Vol. 2(6), pp. 45-56
    BibTeX
    @article{Murali2013a,
     author = {Murali, S and Chittapur, Govindraj B and Anami, Basavaraj S and others},
     title = {Comparision and analysis of photo image forgery detection techniques},
     journal = {International Journal on Computational Sciences & Applications (IJCSA)},
     year = {2013},
     volume = {2},
     number = {6},
     pages = {45--56}}
    
  173. C. Neamtu, C. Barca, E. Achimescu & B. Gavriloaia
    Exposing copy-move image tampering using forensic method based on SURF
    Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ECAI.2013.6636173
    BibTeX
    @inproceedings{Neamtu2013,
     author = {Neamtu, C. and Barca, C. and Achimescu, E. and Gavriloaia, B.},
     title = {Exposing copy-move image tampering using forensic method based on SURF},
     booktitle = {Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on},
     year = {2013},
     pages = {1--4}}
    
  174. A. Newson, A. Almansa, M. Fradet, Y. Gousseau & P. Pérez
    Towards Fast, Generic Video Inpainting
    Proceedings of the 10th European Conference on Visual Media Production
    ACM, 2013, pp. 7:1-7:8
    DOI: 10.1145/2534008.2534019
    BibTeX
    @inproceedings{Newson2013,
     author = {Newson, Alasdair and Almansa, Andrés and Fradet, Matthieu and Gousseau, Yann and Pérez, Patrick},
     title = {Towards Fast, Generic Video Inpainting},
     booktitle = {Proceedings of the 10th European Conference on Visual Media Production},
     publisher = {ACM},
     year = {2013},
     pages = {7:1--7:8}}
    
  175. T.-T. Ng & S.-F. Chang
    Discrimination of Computer Synthesized or Recaptured Images from Real Images
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 275-312
    BibTeX
    @incollection{Ng2013,
     author = {Tian-Tsong Ng and Shih-Fu Chang},
     title = {Discrimination of Computer Synthesized or Recaptured Images from Real Images},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {275--312}}
    
  176. H.C. Nguyen
    Security of Forensic Techniques for Digital Images
    Technische Universität Darmstadt, Technische Universität Darmstadt, 2013
    BibTeX
    @phdthesis{Nguyen2013,
     author = {Hieu Cuong Nguyen},
     title = {Security of Forensic Techniques for Digital Images},
     school = {Technische Universität Darmstadt},
     year = {2013}}
    
  177. H.C. Nguyen & S. Katzenbeisser
    Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
    Communications and Multimedia Security
    Springer, 2013
    DOI: 10.1007/978-3-642-40779-6_9
    BibTeX
    @incollection{Nguyen2013a,
     author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan},
     title = {Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine},
     booktitle = {Communications and Multimedia Security},
     publisher = {Springer},
     year = {2013}}
    
  178. NPPA
    NPPA Code of Ethics
    2013
    BibTeX
    @electronic{NPPA2013,
     author = {NPPA},
     title = {NPPA Code of Ethics},
     year = {2013}}
    
  179. A.L.S. Orozco, J.R. Corripio, D.M.A. González, L.J.G. Villalba & J.C.H. Castro
    Techniques for Source Camera Identification
    Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology
    ICIT, 2013
    BibTeX
    @inproceedings{Orozco2013,
     author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and David Manuel Arenas González and Luis Javier García Villalba and Julio César Hernández Castro},
     title = {Techniques for Source Camera Identification},
     booktitle = {Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology},
     journal = {ICIT},
     year = {2013}}
    
  180. L. Pancheri, E. Panina, G.F.D. Betta, L. Gasparini & D. Stoppa
    Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating
    Proc. ESSCIRC (ESSCIRC)
    2013, pp. 295-298
    DOI: 10.1109/ESSCIRC.2013.6649131
    BibTeX
    @inproceedings{Pancheri2013,
     author = {L. Pancheri and E. Panina and G. F. Dalla Betta and L. Gasparini and D. Stoppa},
     title = {Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating},
     booktitle = {Proc. ESSCIRC (ESSCIRC)},
     year = {2013},
     pages = {295--298}}
    
  181. A. Pande, S. Chen, P. Mohapatra & J. Zambreno
    Hardware Architecture for Video Authentication using Sensor Pattern Noise
    Circuits and Systems for Video Technology, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TCSVT.2013.2276869
    BibTeX
    @article{Pande2013,
     author = {Pande, A. and Chen, S. and Mohapatra, P. and Zambreno, J.},
     title = {Hardware Architecture for Video Authentication using Sensor Pattern Noise},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2013},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  182. C. Pasquini & G. Boato
    JPEG compression anti-forensics based on first significant digit distribution
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 500-505
    DOI: 10.1109/MMSP.2013.6659339
    BibTeX
    @inproceedings{Pasquini2013,
     author = {Pasquini, Cecilia and Boato, Giulia},
     title = {JPEG compression anti-forensics based on first significant digit distribution},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {500--505}}
    
  183. A. Peng & X. Kang
    Robust Median Filtering Detection Based on Filtered Residual
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 344-357
    DOI: 10.1007/978-3-642-40099-5_29
    BibTeX
    @incollection{Peng2013b,
     author = {Peng, Anjie and Kang, Xiangui},
     title = {Robust Median Filtering Detection Based on Filtered Residual},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {344--357}}
    
  184. F. Peng, J. Li & M. Long
    Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features
    Journal of Computational Information Systems, 2013, Vol. 9(13), pp. 101-5108
    BibTeX
    @article{Peng2013a,
     author = {Fei Peng and Jiaoting Li and Min Long},
     title = {Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {13},
     pages = {101--5108}}
    
  185. F. Peng, J. Shi & M. Long
    Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification
    Journal of Computational Information Systems, 2013, Vol. 9(14), pp. 585-5592
    BibTeX
    @article{Peng2013,
     author = {Fei Peng and Jiaoling Shi and Min Long},
     title = {Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {14},
     pages = {585--5592}}
    
  186. Y. Peng & B. Liu
    Accurate estimation of primary quantisation table with applications to tampering detection
    Institution of Engineering and Technology, Electronics Letters, 2013
    DOI: 10.1049/el.2013.2218
    BibTeX
    @article{Peng2013c,
     author = {Yuanyuan Peng and Benyong Liu},
     title = {Accurate estimation of primary quantisation table with applications to tampering detection},
     journal = {Institution of Engineering and Technology, Electronics Letters},
     year = {2013}}
    
  187. A. Piva
    An Overview on Image Forensics
    ISRN Signal Processing, 2013, Vol. 2013, pp. 1-22
    DOI: 10.1155/2013/496701
    BibTeX
    @article{Piva2013,
     author = {Piva, Alessandro},
     title = {An Overview on Image Forensics},
     journal = {ISRN Signal Processing},
     year = {2013},
     volume = {2013},
     pages = {1--22}}
    
  188. Presserat
    Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats
    2013
    BibTeX
    @electronic{Presserat2013,
     author = {Presserat},
     title = {Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats},
     year = {2013}}
    
  189. G. Puglisi, A. Bruna, F. Galvan & S. Battiato
    First JPEG Quantization Matrix Estimation Based On Histogram Analysis
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4502 - 4506
    BibTeX
    @inproceedings{Puglisi2013,
     author = {Giovanni Puglisi and Arcangelo Bruna and Fausto Galvan and Sebastiano Battiato},
     title = {First JPEG Quantization Matrix Estimation Based On Histogram Analysis},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4502 -- 4506}}
    
  190. T. Qazi, K. Hayat, S.U. Khan, S.A. Madani, I.A. Khan, J. Kołodziej, H. Li, W. Lin, K.C. Yow & C.-Z. Xu
    Survey on blind image forgery detection
    IET Image Processing, 2013
    DOI: 10.1049/iet-ipr.2012.0388
    BibTeX
    @article{Qazi2013,
     author = {Tanzeela Qazi and Khizar Hayat and Samee U. Khan and Sajjad A. Madani and Imran A. Khan and Joanna Kołodziej and Hongxiang Li and Weiyao Lin and Kin Choong Yow and Cheng-Zhong Xu},
     title = {Survey on blind image forgery detection},
     journal = {IET Image Processing},
     year = {2013}}
    
  191. R. Qian, W. Li & N. Yu
    High precision rotation angle estimation for rotated images
    Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ICMEW.2013.6618298
    BibTeX
    @inproceedings{Qian2013a,
     author = {Ruohan Qian and Weihai Li and Nenghai Yu},
     title = {High precision rotation angle estimation for rotated images},
     booktitle = {Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1--4}}
    
  192. R. Qian, W. Li, N. Yu & B. Liu
    High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance
    Image and Graphics (ICIG), 2013 Seventh International Conference on
    2013, pp. 106-111
    DOI: 10.1109/ICIG.2013.27
    BibTeX
    @inproceedings{Qian2013,
     author = {Ruohan Qian and Weihai Li and Nenghai Yu and Bin Liu},
     title = {High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance},
     booktitle = {Image and Graphics (ICIG), 2013 Seventh International Conference on},
     year = {2013},
     pages = {106--111}}
    
  193. Z. Qian & T. Qiao
    Simplified Anti-Forensics of JPEG Compression
    Journal of Computers, ACADEMY PUBLISHER, 2013, Vol. 8(10), pp. 2483-2488
    DOI: 10.4304/jcp.8.10.2483-2488
    BibTeX
    @article{Qian2013b,
     author = {Zhenxing Qian and Tong Qiao},
     title = {Simplified Anti-Forensics of JPEG Compression},
     journal = {Journal of Computers},
     publisher = {ACADEMY PUBLISHER},
     year = {2013},
     volume = {8},
     number = {10},
     pages = {2483--2488}}
    
  194. Z. Qu, X. Kang, J. Huang & Y. Li
    Forensic sensor pattern noise extraction from large image data set
    Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
    2013, pp. 3023-3027
    DOI: 10.1109/ICASSP.2013.6638213
    BibTeX
    @inproceedings{Qu2013a,
     author = {Z. Qu and X. Kang and J. Huang and Y. Li},
     title = {Forensic sensor pattern noise extraction from large image data set},
     booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics},
     year = {2013},
     pages = {3023--3027}}
    
  195. Z. Qu, X. Kang, J. Huang & S.Y.-S. Yinxiang Li
    Forensic Sensor Pattern Noise Extraction From Large Image Data Set
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638213
    BibTeX
    @inproceedings{Qu2013,
     author = {Zhenhua Qu and Xiangui Kang and Jiwu Huang and Yinxiang Li, Sun Yat-Sen},
     title = {Forensic Sensor Pattern Noise Extraction From Large Image Data Set},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  196. D. Quick & K.-K.R. Choo
    Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.07.001
    BibTeX
    @article{Quick2013,
     author = {Darren Quick and Kim-Kwang Raymond Choo},
     title = {Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  197. S. Rahman & A. Robles-Kelly
    A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 2034-2038
    BibTeX
    @inproceedings{Rahman2013,
     author = {Sejuti Rahman and Antonio Robles-Kelly},
     title = {A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {2034--2038}}
    
  198. V. Raj & L. Thomas
    A Novel Approach for Forgery Detection of Images
    International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2013
    BibTeX
    @article{Raj2013,
     author = {Vimal Raj and Lija Thomas},
     title = {A Novel Approach for Forgery Detection of Images},
     journal = {International Journal of Application or Innovation in Engineering & Management (IJAIEM)},
     year = {2013}}
    
  199. M. Purnachandra Rao & A. Rajagopalan
    Harnessing Motion Blur To Uncover Splicing
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4507 - 4511
    BibTeX
    @inproceedings{PurnachandraRao2013,
     author = {M. Purnachandra Rao and A.N. Rajagopalan},
     title = {Harnessing Motion Blur To Uncover Splicing},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4507 -- 4511}}
    
  200. Q. Rao, H. Li, W. Luo & J. Huang
    Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack
    Computational Visual Media Conference, 2013
    BibTeX
    @article{Rao2013,
     author = {Quanquan Rao and Haodong Li and Weiqi Luo and Jiwu Huang},
     title = {Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack},
     journal = {Computational Visual Media Conference},
     year = {2013}}
    
  201. C. Riess
    Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik
    Der Technischen Fakultät der Universität Erlangen--Nürnberg, Der Technischen Fakultät der Universität Erlangen--Nürnberg, 2013
    BibTeX
    @phdthesis{Riess2013,
     author = {Christian Riess},
     title = {Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik},
     school = {Der Technischen Fakultät der Universität Erlangen--Nürnberg},
     year = {2013}}
    
  202. A. Ruifrok, Z. Geradts & J. Bijhold
    Imaging
    Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
    2013, pp. 638-651
    BibTeX
    @inproceedings{Ruifrok2013,
     author = {Arnout Ruifrok and Zeno Geradts and Jurrien Bijhold},
     title = {Imaging},
     booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon},
     year = {2013},
     pages = {638--651}}
    
  203. S.-J. Ryu, M. Kirchner, M.-J. Lee & H.-K. Lee
    Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(8), pp. 1355-1370
    DOI: 10.1109/TIFS.2013.2272377
    BibTeX
    @article{Ryu2013,
     author = {S.-J. Ryu and Kirchner, M. and Lee, M.-J. and Lee, H.-K.},
     title = {Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {8},
     pages = {1355--1370}}
    
  204. A. Saini
    A Survey on Passive-Blind Image Forensics
    Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013), 2013
    BibTeX
    @article{Saini2013,
     author = {Anupama Saini},
     title = {A Survey on Passive-Blind Image Forensics},
     journal = {Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013)},
     year = {2013}}
    
  205. A. Sandoval Orozco, D. Arenas González, J. Rosales Corripio, L. García Villalba & J. Hernandez-Castro
    Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections
    Computing, Springer Vienna, 2013, Vol. -, pp. 1-13
    DOI: 10.1007/s00607-013-0313-5
    BibTeX
    @article{SandovalOrozco2013,
     author = {Sandoval Orozco, A.L. and Arenas González, D.M. and Rosales Corripio, J. and García Villalba, L.J. and Hernandez-Castro, J.C.},
     title = {Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections},
     journal = {Computing},
     publisher = {Springer Vienna},
     year = {2013},
     volume = {-},
     pages = {1--13}}
    
  206. R. Satta & P. Stirparo
    Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise
    Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK
    2013
    DOI: 10.1049/ic.2013.0266
    BibTeX
    @inproceedings{Satta2013,
     author = {Riccardo Satta and Pasquale Stirparo},
     title = {Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise},
     booktitle = {Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK},
     year = {2013}}
    
  207. H.T. Sencar & N.D. Memon
    Digital Image Forensics: There is More to a Picture than Meets the Eye
    Springer, 2013
    BibTeX
    @book{Sencar2013,
     author = {Husrev T. Sencar and Nasir D. Memon},
     title = {Digital Image Forensics: There is More to a Picture than Meets the Eye},
     publisher = {Springer},
     year = {2013}}
    
  208. M. Shabanifard, M.G. Shayesteh & M.A. Akhaee
    Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram
    Institution of Engineering and Technology, Institution of Engineering and Technology, 2013, pp. -(0)
    BibTeX
    @article{Shabanifard2013,
     author = {Mahmood Shabanifard and Mahrokh G. Shayesteh and Mohammad Ali Akhaee},
     title = {Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram},
     journal = {Institution of Engineering and Technology},
     publisher = {Institution of Engineering and Technology},
     year = {2013},
     pages = {-(0)}}
    
  209. T. Shanableh
    Detection of frame deletion for digital video forensics
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.10.004
    BibTeX
    @article{Shanableh2013,
     author = {Tamer Shanableh},
     title = {Detection of frame deletion for digital video forensics},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  210. A. Sharang & P. Jindal
    Digital Image forensics using noise features
    Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, 2013
    BibTeX
    @techreport{Sharang2013,
     author = {Abhijit Sharang and Pankaj Jindal},
     title = {Digital Image forensics using noise features},
     school = {Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur},
     year = {2013}}
    
  211. C. Sharma & U. Datta
    Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances
    International Journal of Computer Technology and Electronics Communication, 2013
    BibTeX
    @article{Sharma2013a,
     author = {Chetna Sharma and Unmukh Datta},
     title = {Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances},
     journal = {International Journal of Computer Technology and Electronics Communication},
     year = {2013}}
    
  212. D. Sharma & P. Abrol
    Digital Image Tampering -- A Threat to Security Management
    International Journal of Advanced Research in Computer and Communication Engineering, 2013, Vol. 2(10), pp. 4120 - 4123
    BibTeX
    @article{Sharma2013,
     author = {Deepika Sharma and Pawanesh Abrol},
     title = {Digital Image Tampering -- A Threat to Security Management},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2013},
     volume = {2},
     number = {10},
     pages = {4120 -- 4123}}
    
  213. X. Shen, Y. Zhu, Y. Lv & H. Chen
    Image Copy-Move Forgery Detection Based on SIFT and Gray Level
    Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3021-3024
    BibTeX
    @article{Shen2013,
     author = {Shen, X.J. and Zhu, Y. and Lv, Y.D. and Chen, H.P.},
     title = {Image Copy-Move Forgery Detection Based on SIFT and Gray Level},
     journal = {Applied Mechanics and Materials},
     publisher = {Trans Tech Publ},
     year = {2013},
     volume = {263},
     pages = {3021--3024}}
    
  214. Y. Sheng, H. Wang & G. Zhang
    Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing
    Jin, D. & Lin, S. (ed.)
    Advances in Mechanical and Electronic Engineering
    Springer Berlin Heidelberg, 2013, Vol. 178, pp. 343-348
    BibTeX
    @incollection{Sheng2013,
     author = {Sheng, YunZhong and Wang, HangJun and Zhang, GuangQun},
     title = {Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing},
     booktitle = {Advances in Mechanical and Electronic Engineering},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {178},
     pages = {343--348}}
    
  215. A.R. Soobhany, K.P. Lam, P. Fletcher & D. Collins
    Source Identification Of Camera Phones Using Svd
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4487-4491
    BibTeX
    @inproceedings{Soobhany2013,
     author = {Ahmad Ryad Soobhany and K. P. Lam and Peter Fletcher and David Collins},
     title = {Source Identification Of Camera Phones Using Svd},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4487--4491}}
    
  216. M.S. Sreelakshmi & D. Venkataraman
    Image compression using anti-forensics method
    CoRR, 2013, Vol. abs/1303.2330
    BibTeX
    @article{Sreelakshmi2013,
     author = {M. S. Sreelakshmi and D. Venkataraman},
     title = {Image compression using anti-forensics method},
     journal = {CoRR},
     year = {2013},
     volume = {abs/1303.2330}}
    
  217. M.S. Sreelakshmi & D. Venkataraman
    Image compression using anti-forensics method
    arxiv, 2013
    BibTeX
    @article{Sreelakshmi2013a,
     author = {M. S. Sreelakshmi and D. Venkataraman},
     title = {Image compression using anti-forensics method},
     journal = {arxiv},
     year = {2013}}
    
  218. M. Stamm, M. Wu & K.J.R. Liu
    Information Forensics: An Overview of the First Decade
    IEEE Access, 2013, Vol. 1, pp. 167-200
    DOI: 10.1109/ACCESS.2013.2260814
    BibTeX
    @article{Stamm2013,
     author = {Stamm, M and Wu, M. and Liu, K. J. R.},
     title = {Information Forensics: An Overview of the First Decade},
     journal = {IEEE Access},
     year = {2013},
     volume = {1},
     pages = {167--200}}
    
  219. B. Su, Q. Yuan, Y. Zhang, M. Zhai & S. Wang
    Rapid Image Splicing Detection Based on Relevance Vector Machine
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 300-310
    DOI: 10.1007/978-3-642-40099-5_25
    BibTeX
    @incollection{Su2013,
     author = {Su, Bo and Yuan, Quanqiao and Zhang, Yujin and Zhai, Mengying and Wang, Shilin},
     title = {Rapid Image Splicing Detection Based on Relevance Vector Machine},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {300--310}}
    
  220. M. Tagliasacchi, M. Visentini-Scarzanella, P.L. Dragotti & S. Tubaro
    Transform Coder Identification
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    2013
    BibTeX
    @inproceedings{Tagliasacchi2013,
     author = {Marco Tagliasacchi and Marco Visentini-Scarzanella and Pier Luigi Dragotti and Stefano Tubaro},
     title = {Transform Coder Identification},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     year = {2013}}
    
  221. W. Taktak & J.-L. Dugelay
    Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
    The Era of Interactive Media
    Springer New York, 2013, pp. 37-51
    DOI: 10.1007/978-1-4614-3501-3_4
    BibTeX
    @incollection{Taktak2013,
     author = {Taktak, Wiem and Dugelay, Jean-Luc},
     title = {Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries},
     booktitle = {The Era of Interactive Media},
     publisher = {Springer New York},
     year = {2013},
     pages = {37--51}}
    
  222. G.R. Talmale & Y. Malode
    Study Of Different Techniques Of Image Forgery Detection
    International Journal of Advanced Research in Computer Science, 2013, Vol. 4(1), pp. 8-13
    BibTeX
    @article{Talmale2013,
     author = {Girish. R. Talmale and Yogesh Malode},
     title = {Study Of Different Techniques Of Image Forgery Detection},
     journal = {International Journal of Advanced Research in Computer Science},
     year = {2013},
     volume = {4},
     number = {1},
     pages = {8--13}}
    
  223. S.A. Thajeel & G.B. Sulong
    State of The Art of Copy-move Forgery Detection Techniques: A Review
    IJCSI International Journal of Computer Science, 2013, Vol. 10(6), pp. 174-183
    BibTeX
    @article{Thajeel2013,
     author = {Thajeel, Salam A. and Ghazali Bin Sulong},
     title = {State of The Art of Copy-move Forgery Detection Techniques: A Review},
     journal = {IJCSI International Journal of Computer Science},
     year = {2013},
     volume = {10},
     number = {6},
     pages = {174--183}}
    
  224. E. Tokuda, H. Pedrini & A. Rocha
    Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach
    Journal of Visual Communication and Image Representation, 2013(0), pp. -
    DOI: 10.1016/j.jvcir.2013.08.009
    BibTeX
    @article{Tokuda2013,
     author = {Eric Tokuda and Helio Pedrini and Anderson Rocha},
     title = {Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  225. Y. Tomioka, Y. Ito & H. Kitazawa
    Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(12), pp. 1986-1995
    DOI: 10.1109/TIFS.2013.2284761
    BibTeX
    @article{Tomioka2013,
     author = {Y. Tomioka and Ito, Y. and Kitazawa, H.},
     title = {Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {12},
     pages = {1986--1995}}
    
  226. S. Tong, Z. Zhang, Y. Xie & X. Wu
    Image Splicing Detection Based on Statistical Properties of Benford Model
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013
    DOI: 10.2991/iccsee.2013.200
    BibTeX
    @inproceedings{Tong2013,
     author = {Tong, Senfeng And Zhang, Zhen And Xie, Yongjie And Wu, Xiaodi},
     title = {Image Splicing Detection Based on Statistical Properties of Benford Model},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013}}
    
  227. S.F. Tong, Y.H. Yang & Y.J. Xie
    Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics
    Vehicle, Mechatronics and Information Technologies, 2013, Vol. 380 - 384, pp. 1306-1309
    DOI: 10.4028/www.scientific.net/AMM.380-384.1306
    BibTeX
    @article{Tong2013a,
     author = {Sen Feng Tong and Yu Hao Yang and Yong Jie Xie},
     title = {Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics},
     journal = {Vehicle, Mechatronics and Information Technologies},
     year = {2013},
     volume = {380 - 384},
     pages = {1306--1309}}
    
  228. D. Tralic, I. Zupancic, S. Grgic & M. Grgic
    CoMoFoD --- New database for copy-move forgery detection
    ELMAR, 2013 55th International Symposium
    2013, pp. 49-54
    BibTeX
    @inproceedings{Tralic2013,
     author = {Tralic, Dijana and Zupancic, Ivan and Grgic, Sonja and Grgic, Mislay},
     title = {CoMoFoD --- New database for copy-move forgery detection},
     booktitle = {ELMAR, 2013 55th International Symposium},
     year = {2013},
     pages = {49--54}}
    
  229. G. Ulutas & M. Ulutas
    Image forgery detection using Color Coherence Vector
    Electronics, Computer and Computation (ICECCO), 2013 International Conference on
    2013, pp. 107-110
    DOI: 10.1109/ICECCO.2013.6718240
    BibTeX
    @inproceedings{Ulutas2013b,
     author = {Ulutas, G. and Ulutas, M.},
     title = {Image forgery detection using Color Coherence Vector},
     booktitle = {Electronics, Computer and Computation (ICECCO), 2013 International Conference on},
     year = {2013},
     pages = {107--110}}
    
  230. G. Ulutas, M. Ulutas & V.V. Nabiyev
    Copy move forgery detection based on LBP
    Signal Processing and Communications Applications Conference (SIU), 2013 21st
    2013, pp. 1-4
    DOI: 10.1109/SIU.2013.6531569
    BibTeX
    @inproceedings{Ulutas2013,
     author = {Ulutas, G. and Ulutas, M. and Nabiyev, V. V.},
     title = {Copy move forgery detection based on LBP},
     booktitle = {Signal Processing and Communications Applications Conference (SIU), 2013 21st},
     year = {2013},
     pages = {1--4}}
    
  231. G. Valenzise, M. Tagliasacchi & S. Tubaro
    Revealing the Traces of JPEG Compression Anti-Forensics
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(2), pp. 335-349
    DOI: 10.1109/TIFS.2012.2234117
    BibTeX
    @article{Valenzise2013,
     author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Revealing the Traces of JPEG Compression Anti-Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {2},
     pages = {335--349}}
    
  232. J. Valera & N. Garcia
    Unambiguous interpolation rate estimation in uncompressed resized color digital images
    Biometrics and Forensics (IWBF), 2013 International Workshop on
    2013, pp. 1-4
    DOI: 10.1109/IWBF.2013.6547314
    BibTeX
    @inproceedings{Valera2013,
     author = {Jesus Valera and Narciso Garcia},
     title = {Unambiguous interpolation rate estimation in uncompressed resized color digital images},
     booktitle = {Biometrics and Forensics (IWBF), 2013 International Workshop on},
     year = {2013},
     pages = {1--4}}
    
  233. D. Vázquez-Padın, P. Comesana & F. Pérez-González
    Set-Membership Identification of Resampled Signals
    2013 IEEE International Workshop on Information Forensics and Security (WIFS)
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/WIFS.2013.6707810
    BibTeX
    @inproceedings{Vazquez-Padin2013,
     author = {D. Vázquez-Padın and P. Comesana and F Pérez-González},
     title = {Set-Membership Identification of Resampled Signals},
     booktitle = {2013 IEEE International Workshop on Information Forensics and Security (WIFS)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  234. S. Venkata
    Pixel Estimation Based Video Forgery Detection
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638216
    BibTeX
    @inproceedings{Venkata2013,
     author = {Subramanyam Venkata},
     title = {Pixel Estimation Based Video Forgery Detection},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  235. N.D. Wandji & S. Xingming
    Robust Detection of Copy-Move Forgery in Color Images
    2013
    BibTeX
    @electronic{Wandji2013a,
     author = {Nathalie Diane Wandji and Sun Xingming},
     title = {Robust Detection of Copy-Move Forgery in Color Images},
     year = {2013}}
    
  236. N.D. Wandji, S. Xingming & M.F. Kue
    Detection of copy-move forgery in digital images based on DCT
    Arxiv, 2013
    BibTeX
    @article{Wandji2013,
     author = {Nathalie Diane Wandji and Sun Xingming and Moise Fah Kue},
     title = {Detection of copy-move forgery in digital images based on DCT},
     journal = {Arxiv},
     year = {2013}}
    
  237. T. Wang, J. Tang & B. Luo
    Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants
    Proc. Seventh Int Image and Graphics (ICIG) Conf
    2013, pp. 258-264
    DOI: 10.1109/ICIG.2013.61
    BibTeX
    @inproceedings{Wang2013b,
     author = {T. Wang and J. Tang and B. Luo},
     title = {Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants},
     booktitle = {Proc. Seventh Int Image and Graphics (ICIG) Conf},
     year = {2013},
     pages = {258--264}}
    
  238. W. Wang, X. Jiang, S. Wang & T. Sun
    Estimation of the primary quantization parameter in MPEG videos
    Visual Communications and Image Processing (VCIP), 2013
    2013, pp. 1-6
    DOI: 10.1109/VCIP.2013.6706413
    BibTeX
    @inproceedings{Wang2013,
     author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Sun, Tanfeng},
     title = {Estimation of the primary quantization parameter in MPEG videos},
     booktitle = {Visual Communications and Image Processing (VCIP), 2013},
     year = {2013},
     pages = {1--6}}
    
  239. W. Wang, F. Zeng, H. Yuan & X. Duan
    Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur
    Journal of Computers, 2013, Vol. 8(11)
    DOI: 10.4304/jcp.8.11.2789-2794
    BibTeX
    @article{Wang2013a,
     author = {Wei Wang and Feng Zeng and Honglin Yuan and Xintao Duan},
     title = {Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur},
     journal = {Journal of Computers},
     year = {2013},
     volume = {8},
     number = {11}}
    
  240. J. Watanabe, T. Hosaka & T. Hamamoto
    Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images
    IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(8), pp. 1882-1885
    BibTeX
    @article{Watanabe2013,
     author = {Joji Watanabe And Tadaaki Hosaka And Takayuki Hamamoto},
     title = {Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2013},
     volume = {E96-D},
     number = {8},
     pages = {1882--1885}}
    
  241. J. Wen
    Duplicated Region Detection Using Robust Features
    International Journal of Applied Mathematics and Statistics, 2013, Vol. 49(19)
    BibTeX
    @article{Wen2013,
     author = {Jiang Wen},
     title = {Duplicated Region Detection Using Robust Features},
     journal = {International Journal of Applied Mathematics and Statistics},
     year = {2013},
     volume = {49},
     number = {19}}
    
  242. L. Wu, X. Kong, B. Wang & S. Shang
    Image tampering localization via estimating the non-aligned double JPEG compression
    Proc. SPIE 8665, Media Watermarking, Security, and Forensics, 2013, pp. 86650R-86650R-7
    DOI: 10.1117/12.2003695
    BibTeX
    @article{Wu2013b,
     author = {Wu, Lanying and Kong, Xiangwei and Wang, Bo and Shang, Shize},
     title = {Image tampering localization via estimating the non-aligned double JPEG compression},
     journal = {Proc. SPIE 8665, Media Watermarking, Security, and Forensics},
     year = {2013},
     pages = {86650R-86650R-7}}
    
  243. S. Wu & D. Shen
    Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization
    Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3104-3107
    BibTeX
    @article{Wu2013,
     author = {Wu, S.B. and Shen, D.S.},
     title = {Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization},
     journal = {Applied Mechanics and Materials},
     publisher = {Trans Tech Publ},
     year = {2013},
     volume = {263},
     pages = {3104--3107}}
    
  244. Z.-H. Wu, M.C. Stamm & K.J.R. Liu
    Anti-forensics Of Median Filtering
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638217
    BibTeX
    @inproceedings{Wu2013a,
     author = {Zhung-Han Wu and Matthew C. Stamm and K. J. Ray Liu},
     title = {Anti-forensics Of Median Filtering},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  245. Y.J. Xie, Y. Bao, S.F. Tong & Y.H. Yang
    Source Camera Identification Based on In-and-Inter Channel Traces
    Applied Mechanics and Materials, 2013, Vol. 380-384, pp. 3754-3757
    DOI: 10.4028/www.scientific.net/AMM.380-384.3754
    BibTeX
    @article{Xie2013a,
     author = {Yong Jie Xie and Yi Bao and Sen Feng Tong and Yu Hao Yang},
     title = {Source Camera Identification Based on In-and-Inter Channel Traces},
     journal = {Applied Mechanics and Materials},
     year = {2013},
     volume = {380-384},
     pages = {3754--3757}}
    
  246. Y.-j. Xie, BAO Yi, TONG Sen-feng & YANG Yu-hao
    Source Digital Image Identification based on Cross-correlation
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013, pp. 201
    DOI: 10.2991/iccsee.2013.199
    BibTeX
    @inproceedings{Xie2013,
     author = {Xie, Yong-jie and BAO, Yi and TONG, Sen-feng and YANG, Yu-hao},
     title = {Source Digital Image Identification based on Cross-correlation},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013},
     pages = {201}}
    
  247. W. Xiuping, B. Ruilin & G. Xinnian
    Camera calibration method based on a flexible spliced pattern of equilateral triangles
    Chinese Automation Congress (CAC), 2013
    2013, pp. 250-254
    DOI: 10.1109/CAC.2013.6775737
    BibTeX
    @inproceedings{Xiuping2013,
     author = {Wang Xiuping and Bai Ruilin and Guo Xinnian},
     title = {Camera calibration method based on a flexible spliced pattern of equilateral triangles},
     booktitle = {Chinese Automation Congress (CAC), 2013},
     year = {2013},
     pages = {250--254}}
    
  248. B. Xu, G. Liu & Y. Dai
    Detect Image splicing using merged features in chroma space
    The Scientific World Journal, 2013
    BibTeX
    @article{Xu2013,
     author = {Bo Xu and Guangjie Liu and Yuewei Dai},
     title = {Detect Image splicing using merged features in chroma space},
     journal = {The Scientific World Journal},
     year = {2013}}
    
  249. C. Yan
    Research on forensic identification of forged images
    Proc. Int Mechatronic Sciences, Electric Engineering and Computer (MEC) Conf
    2013, pp. 1152-1155
    DOI: 10.1109/MEC.2013.6885238
    BibTeX
    @inproceedings{Yan2013,
     author = {Cheng Yan},
     title = {Research on forensic identification of forged images},
     booktitle = {Proc. Int Mechatronic Sciences, Electric Engineering and Computer (MEC) Conf},
     year = {2013},
     pages = {1152--1155}}
    
  250. B. Yang & B. Liu
    Image Forgery Detection via Multifeature Classification
    Journal of Pattern Recognition & Image Processing, 2013
    BibTeX
    @article{Yang2013a,
     author = {Benjuan Yang and Benyong Liu},
     title = {Image Forgery Detection via Multifeature Classification},
     journal = {Journal of Pattern Recognition & Image Processing},
     year = {2013}}
    
  251. B. Yang, X. Sun, X. Chen, J. Zhang & X. Li
    An Efficient Forensic Method for Copy-move Forgery Detection Based on DWT-FWHT.
    Radioengineering, 2013, Vol. 22(4), pp. 1098-1105
    BibTeX
    @article{Yang2013b,
     author = {Bin Yang And Xingming Sun And Xianyi Chen And Jianjun Zhang And Xu Li},
     title = {An Efficient Forensic Method for Copy-move Forgery Detection Based on DWT-FWHT.},
     journal = {Radioengineering},
     year = {2013},
     volume = {22},
     number = {4},
     pages = {1098--1105}}
    
  252. J. Yang, E. Ran, D. Xiao & I. Tan
    Digital Image Forgery Forensics by Using Undecimated Dyadic Wavelet Transform and Zernike Moments
    Journal of Computational Information Systems, 2013, Vol. 9(16), pp. 6399-6408
    BibTeX
    @article{Yang2013,
     author = {Jiyun Yang And Ei Ran And Di Xiao And Inyong Tan},
     title = {Digital Image Forgery Forensics by Using Undecimated Dyadic Wavelet Transform and Zernike Moments},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {16},
     pages = {6399--6408}}
    
  253. H. Zeng, Y. Jiang, X. Kang & L. Liu
    Game Theoretic Analysis of Camera Source Identification
    Proceedings of the APSIPA
    2013
    DOI: 10.1109/apsipa.2013.6694150
    BibTeX
    @inproceedings{Zeng2013a,
     author = {Hui Zeng and Yunwen Jiang and Xiangui Kang and Li Liu},
     title = {Game Theoretic Analysis of Camera Source Identification},
     booktitle = {Proceedings of the APSIPA},
     year = {2013}}
    
  254. H. Zeng, X. Kang & J. Huang
    Mixed-strategy Nash Equilibrium In The Camera Source Identification Game
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4472-4476
    DOI: 10.1109/icip.2013.6738921
    BibTeX
    @inproceedings{Zeng2013,
     author = {Hui Zeng and Xiangui Kang and Jiwu Huang},
     title = {Mixed-strategy Nash Equilibrium In The Camera Source Identification Game},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4472--4476}}
    
  255. Y. Zhang, C. Zhao, Y. Pi, S. Li & S. Wang
    Image-splicing forgery detection based on local binary patterns of DCT coefficients
    Security and Communication Networks, 2013, Vol. -, pp. n/a-n/a
    DOI: 10.1002/sec.721
    BibTeX
    @article{Zhang2013,
     author = {Zhang, Yujin and Zhao, Chenglin and Pi, Yiming and Li, Shenghong and Wang, Shilin},
     title = {Image-splicing forgery detection based on local binary patterns of DCT coefficients},
     journal = {Security and Communication Networks},
     year = {2013},
     volume = {-},
     pages = {n/a--n/a}}
    
  256. Y.-j. Zhang, S.-h. Li & S.-l. Wang
    Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations
    Journal of Shanghai Jiaotong University (Science), Shanghai Jiaotong University Press, 2013, Vol. 18, pp. 7-16
    DOI: 10.1007/s12204-013-1362-9
    BibTeX
    @article{Zhang2013a,
     author = {Zhang, Yu-jin and Li, Sheng-hong and Wang, Shi-lin},
     title = {Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations},
     journal = {Journal of Shanghai Jiaotong University (Science)},
     publisher = {Shanghai Jiaotong University Press},
     year = {2013},
     volume = {18},
     pages = {7--16}}
    
  257. J. Zhao & W. Zhao
    Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns
    Mathematical Problems in Engineering, 2013, Vol. 2013
    BibTeX
    @article{Zhao2013a,
     author = {Jie Zhao and Weifeng Zhao},
     title = {Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns},
     journal = {Mathematical Problems in Engineering},
     year = {2013},
     volume = {2013}}
    
  258. X. Zhao, S. Wang, S. Li, J. Li & Q. Yuan
    Image Splicing Detection Based on Noncausal Markov Model
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4462 - 4466
    BibTeX
    @inproceedings{Zhao2013,
     author = {Xudong Zhao and Shilin Wang and Shenghong Li and Jianhua Li and Quanqiao Yuan},
     title = {Image Splicing Detection Based on Noncausal Markov Model},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4462 -- 4466}}
    
  259. N. Zheng, Y. Wang & M. Xu
    A LBP-Based Method for Detecting Copy-Move Forgery with Rotation
    Park, J. J. (J. H., Ng, J. K.-Y., Jeong, H. Y. & Waluyo, B. (ed.)
    Multimedia and Ubiquitous Engineering
    Springer Netherlands, 2013, Vol. 240, pp. 261-267
    DOI: 10.1007/978-94-007-6738-6_33
    BibTeX
    @incollection{Zheng2013,
     author = {Zheng, Ning and Wang, Yixing and Xu, Ming},
     title = {A LBP-Based Method for Detecting Copy-Move Forgery with Rotation},
     booktitle = {Multimedia and Ubiquitous Engineering},
     publisher = {Springer Netherlands},
     year = {2013},
     volume = {240},
     pages = {261--267}}
    
  260. L. Zhong & W. Xu
    A robust image copy-move forgery detection based on mixed moments
    Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on
    2013, pp. 381-384
    DOI: 10.1109/ICSESS.2013.6615329
    BibTeX
    @inproceedings{Zhong2013,
     author = {Le Zhong and Weihong Xu},
     title = {A robust image copy-move forgery detection based on mixed moments},
     booktitle = {Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on},
     year = {2013},
     pages = {381--384}}
    
  261. Proceedings of the 17th Interpol International Forensic Science Managers Symposium, Lyon
    Daéid, N. N. (ed.)
    2013, Vol. Centre for Forensic Science, University of Strathclyde, Glasgow, UK
    DOI: 10.1109/isplc.2013.6525804
    BibTeX
    @proceedings{Interpol2013,,
     title = {Proceedings of the 17th Interpol International Forensic Science Managers Symposium, Lyon},
     year = {2013},
     volume = {Centre for Forensic Science, University of Strathclyde, Glasgow, UK}}
    


2012

  1. B. Aiazzi, L. Alparone, S. Baronti, M. Selva & L. Stefani
    Unsupervised Estimation of Signal-Dependent CCD Camera Noise
    EURASIP Journal on Advances in Signal Processing, Springer, 2012, Vol. 2012(1), pp. 231
    BibTeX
    @article{Aiazzi2012,
     author = {Aiazzi, B. and Alparone, L. and Baronti, S. and Selva, M. and Stefani, L.},
     title = {Unsupervised Estimation of Signal-Dependent CCD Camera Noise},
     journal = {EURASIP Journal on Advances in Signal Processing},
     publisher = {Springer},
     year = {2012},
     volume = {2012},
     number = {1},
     pages = {231}}
    
  2. I. Amerini, R. Caldelli, V. Cappellini, F. Picchioni & A. Piva
    Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification
    International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 2(2), pp. 21-34
    BibTeX
    @article{Amerini2012,
     author = {Irene Amerini and Roberto Caldelli and Vito Cappellini and Francesco Picchioni and and Alessandro Piva},
     title = {Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2012},
     volume = {2},
     number = {2},
     pages = {21-34}}
    
  3. U. Ananya, S.D. Muktanidhi & U. Mudenagudi
    Detection of doctored images using correlations of PSF
    Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
    ACM, 2012, pp. 56:1-56:6
    BibTeX
    @inproceedings{Ananya2012,
     author = {Ananya, U. and Muktanidhi, S. D. and Mudenagudi, Uma},
     title = {Detection of doctored images using correlations of PSF},
     booktitle = {Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing},
     publisher = {ACM},
     year = {2012},
     pages = {56:1--56:6}}
    
  4. T. Baar, W. van Houten & Z. Geradts
    Camera identification by grouping images from database, based on shared noise patterns
    CoRR, 2012, Vol. abs/1207.2641, pp. -
    BibTeX
    @article{Baar2012,
     author = {Teun Baar and Wiger van Houten and Zeno Geradts},
     title = {Camera identification by grouping images from database, based on shared noise patterns},
     journal = {CoRR},
     year = {2012},
     volume = {abs/1207.2641},
     pages = {-}}
    
  5. M. Barni & A. Costanzo
    Dealing with uncertainty in image forensics: A fuzzy approach
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1753-1756
    BibTeX
    @inproceedings{Barni2012,
     author = {Barni, M. and Costanzo, A. },
     title = {Dealing with uncertainty in image forensics: A fuzzy approach},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1753--1756}}
    
  6. M. Barni, M. Fontani & B. Tondi
    A universal technique to hide traces of histogram-based image manipulations
    Proceedings of the on Multimedia and security
    ACM, 2012, pp. 97-104
    BibTeX
    @inproceedings{Barni2012b,
     author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta},
     title = {A universal technique to hide traces of histogram-based image manipulations},
     booktitle = {Proceedings of the on Multimedia and security},
     publisher = {ACM},
     year = {2012},
     pages = {97--104}}
    
  7. M. Barni & B. Tondi
    Optimum forensic and counter-forensic strategies for source identification with training data
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2012, pp. 199-204
    BibTeX
    @inproceedings{Barni2012a,
     author = {Barni, Mauro and Tondi, Benedetta},
     title = {Optimum forensic and counter-forensic strategies for source identification with training data},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2012},
     pages = {199--204}}
    
  8. J.T. Barron & J. Malik
    Shape, albedo, and illumination from a single image of an unknown object
    Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
    2012, pp. 334-341
    BibTeX
    @inproceedings{Barron2012,
     author = {Barron, J. T. and Malik, J.},
     title = {Shape, albedo, and illumination from a single image of an unknown object},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)},
     year = {2012},
     pages = {334--341}}
    
  9. P. Bateman, A. Ho & J. Briffa
    Image Forensics of High Dynamic Range Imaging
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 336-348
    BibTeX
    @incollection{Bateman2012,
     author = {Bateman, Philip and Ho, Anthony and Briffa, Johann},
     title = {Image Forensics of High Dynamic Range Imaging},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {336-348}}
    
  10. S. Battiato, G.M. Farinella, E. Messina & G. Puglisi
    Robust Image Alignment for Tampering Detection
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1105-1117
    BibTeX
    @article{Battiato2012a,
     author = {Battiato, S. and Farinella, G. M. and Messina, E. and Puglisi, G. },
     title = {Robust Image Alignment for Tampering Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {4},
     pages = {1105--1117}}
    
  11. F. Battisti, M. Carli & A. Neri
    Image forgery detection by means of no-reference quality metrics
    Memon, N. D., Alattar, A. M. & III, E. J. D. (ed.)
    Proc. SPIE 8303
    Media Watermarking, Security, and Forensics 2012, SPIE, 2012, Vol. 8303(1), pp. 83030K
    BibTeX
    @inproceedings{Battisti2012,
     author = {F. Battisti and M. Carli and A. Neri},
     title = {Image forgery detection by means of no-reference quality metrics},
     booktitle = {Proc. SPIE 8303},
     journal = {Media Watermarking, Security, and Forensics 2012},
     publisher = {SPIE},
     year = {2012},
     volume = {8303},
     number = {1},
     pages = {83030K}}
    
  12. S. Bayram, H.T. Sencar & N. Memon
    Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1404-1413
    BibTeX
    @article{Bayram2012,
     author = {Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {Efficient Sensor Fingerprint Matching Through Fingerprint Binarization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {4},
     pages = {1404--1413}}
    
  13. P. Bestagini, A. Allam, S. Milani, M. Tagliasacchi & S. Tubaro
    Video codec identification
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 2257-2260
    BibTeX
    @inproceedings{Bestagini2012a,
     author = {Bestagini, Paolo and Allam, Ahmed and Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Video codec identification},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {2257--2260}}
    
  14. P. Bestagini, M. Fontani, S. Milani, M. Barni, A. Piva, M. Tagliasacchi & S. Tubaro
    An Overview on Video Forensics
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012, pp. 1234-1238
    BibTeX
    @inproceedings{Bestagini2012,
     author = {P. Bestagini and M. Fontani and S. Milani and M. Barni and A. Piva and M. Tagliasacchi and S. Tubaro},
     title = {An Overview on Video Forensics},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012},
     pages = {1234-1238}}
    
  15. T. Bianchi & A. Piva
    Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1003 - 1017
    BibTeX
    @article{Bianchi2012,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {3},
     pages = {1003 - 1017}}
    
  16. T. Bianchi & A. Piva
    Reverse engineering of double JPEG compression in the presence of image resizing
    Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
    2012, pp. 127-132
    BibTeX
    @inproceedings{Bianchi2012a,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Reverse engineering of double JPEG compression in the presence of image resizing},
     booktitle = {Information Forensics and Security (WIFS), 2012 IEEE International Workshop on},
     year = {2012},
     pages = {127--132}}
    
  17. T. Bianchi & A. Piva
    Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps
    Information Forensics and Security, IEEE Transactions on, 2012, Vol. 7(2), pp. 842-848
    BibTeX
    @article{Bianchi2012b,
     author = {Bianchi, T. and Piva, A.},
     title = {Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2012},
     volume = {7},
     number = {2},
     pages = {842-848}}
    
  18. R. Böhme & M. Kirchner
    Digital Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Chapter Counter-Forensics: Attacking Image Forensics
    Springer, 2012, pp. -
    BibTeX
    @inbook{Boehme2012,
     author = {Rainer Böhme and Matthias Kirchner},
     title = {Digital Image Forensics},
     publisher = {Springer},
     year = {2012},
     pages = {-}}
    
  19. R. Bora & N. Shahane
    Image forgery detection through motion blur estimates
    Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on
    2012, pp. 1-4
    BibTeX
    @inproceedings{Bora2012,
     author = {Bora, R.M. and Shahane, N.M.},
     title = {Image forgery detection through motion blur estimates},
     booktitle = {Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on},
     year = {2012},
     pages = {1--4}}
    
  20. S. Brindha & S. Kumarganesh
    Detecting Primary,secondary and Triple Jpeg Compression Having Same Quantization Matrix
    International Journal of Communications and Engineering, 2012, Vol. 3(3), pp. 8-14
    BibTeX
    @article{Brindha2012,
     author = {S. Brindha and S Kumarganesh},
     title = {Detecting Primary,secondary and Triple Jpeg Compression Having Same Quantization Matrix},
     journal = {International Journal of Communications and Engineering},
     year = {2012},
     volume = {3},
     number = {3},
     pages = {8-14}}
    
  21. W. Bu, M. Xu & N. Zheng
    A Tampered Image Detecting Method Based on Wavelet Analysis
    International Journal of Information and Electronics Engineering, 2012, Vol. 2(2), pp. 38-43
    BibTeX
    @article{Bu2012,
     author = {Wenqing Bu and Ming Xu and Ning Zheng},
     title = {A Tampered Image Detecting Method Based on Wavelet Analysis},
     journal = {International Journal of Information and Electronics Engineering},
     year = {2012},
     volume = {2},
     number = {2},
     pages = {38-43}}
    
  22. S. Cai & M. Li
    Blind CFA Interpolation Detection Based on the Entropy
    Advanced Materials Research, 2012, Vol. 532 - 533 Materials Science and Information Technology II, pp. 787-791
    BibTeX
    @article{Cai2012,
     author = {Suozhang Cai and Mingli Li},
     title = {Blind CFA Interpolation Detection Based on the Entropy},
     journal = {Advanced Materials Research},
     year = {2012},
     volume = {532 - 533 Materials Science and Information Technology II},
     pages = {787-791}}
    
  23. R. Caldelli, I. Amerini, L. Ballan, G. Serra, M. Barni & A. Costanzo
    On the effectiveness of local warping against SIFT-based copy-move detection
    Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
    2012, pp. 1-5
    BibTeX
    @inproceedings{Caldelli2012,
     author = {Caldelli, R. and Amerini, I. and Ballan, L. and Serra, G. and Barni, M. and Costanzo, A.},
     title = {On the effectiveness of local warping against SIFT-based copy-move detection},
     booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp},
     year = {2012},
     pages = {1--5}}
    
  24. H. Cao & A. Kot
    Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection
    Shi, Y. (ed.)
    Transactions on Data Hiding and Multimedia Security VII
    Springer Berlin / Heidelberg, 2012, Vol. 7110, pp. 63-81
    BibTeX
    @incollection{Cao2012,
     author = {Cao, Hong and Kot, Alex},
     title = {Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection},
     booktitle = {Transactions on Data Hiding and Multimedia Security VII},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7110},
     pages = {63-81}}
    
  25. H. Cao & A. Kot
    Detection of Tampering Inconsistencies on Mobile Photos
    Proc. Int. Workshop on Digital Watermarking
    Lecture Notes in Computer Science, 2012, Vol. -, pp. 115-119
    BibTeX
    @article{Cao2012c,
     author = {H. Cao and A.C. Kot},
     title = {Detection of Tampering Inconsistencies on Mobile Photos},
     booktitle = {Proc. Int. Workshop on Digital Watermarking},
     journal = {Lecture Notes in Computer Science},
     year = {2012},
     volume = {-},
     pages = {115--119}}
    
  26. H. Cao & A.C. Kot
    Measuring the statistical correlation inconsistencies in mobile images for tamper detection
    Shi, Y. Q. (ed.)
    Transactions on Data Hiding and Multimedia Security VII
    Chapter Measuring the statistical correlation inconsistencies in mobile images for tamper detection
    Springer-Verlag, 2012, pp. 63-81
    BibTeX
    @incollection{Cao2012b,
     author = {Cao, Hong and Kot, Alex C.},
     title = {Measuring the statistical correlation inconsistencies in mobile images for tamper detection},
     booktitle = {Transactions on Data Hiding and Multimedia Security VII},
     publisher = {Springer-Verlag},
     year = {2012},
     pages = {63--81}}
    
  27. H. Cao & A.C. Kot
    Manipulation Detection on Image Patches Using FusionBoost
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 992-1002
    BibTeX
    @article{Cao2012a,
     author = {Cao, H. and Kot, A. C. },
     title = {Manipulation Detection on Image Patches Using FusionBoost},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {3},
     pages = {992--1002}}
    
  28. Y. Cao
    Improvement of Real-Time Image Splicing Method Basic on Gray Level
    Computer Science & Service System (CSSS), 2012 International Conference on
    2012, pp. 1555-1558
    BibTeX
    @inproceedings{Cao2012d,
     author = {YueQin Cao},
     title = {Improvement of Real-Time Image Splicing Method Basic on Gray Level},
     booktitle = {Computer Science & Service System (CSSS), 2012 International Conference on},
     year = {2012},
     pages = {1555--1558}}
    
  29. G. Cattaneo, P. Faruolo & U.F. Petrillo
    Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification
    Proc. Sixth Int Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) Conf
    2012, pp. 609-616
    BibTeX
    @inproceedings{Cattaneo2012,
     author = {Giuseppe Cattaneo and Pompeo Faruolo and Umberto Ferraro Petrillo},
     title = {Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification},
     booktitle = {Proc. Sixth Int Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) Conf},
     year = {2012},
     pages = {609--616}}
    
  30. L.-H. Chan, N.-F. Law & W.-C. Siu
    A two dimensional camera identification method based on image sensor noise
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1741-1744
    BibTeX
    @inproceedings{Chan2012,
     author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi},
     title = {A two dimensional camera identification method based on image sensor noise},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1741--1744}}
    
  31. C. Chen & J. Ni
    Median Filtering Detection Using Edge Based Prediction Matrix
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 361-375
    BibTeX
    @incollection{Chen2012,
     author = {Chen, Chenglong and Ni, Jiangqun},
     title = {Median Filtering Detection Using Edge Based Prediction Matrix},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {361-375}}
    
  32. C. Chen, J. Ni, R. Huang & J.H.
    Blind Median Filtering Detection Using Statistics in Difference Domain
    ihconference.org
    2012
    BibTeX
    @inproceedings{Chen2012b,
     author = {C Chen and J Ni and R Huang and, J Huang},
     title = {Blind Median Filtering Detection Using Statistics in Difference Domain},
     booktitle = {ihconference.org},
     year = {2012}}
    
  33. L. Chen, W. Lu & J. Ni
    An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
    International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 4(1), pp. 49-53
    BibTeX
    @article{Chen2012a,
     author = {Likai Chen and Wei Lu and Jiangqun Ni},
     title = {An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2012},
     volume = {4},
     number = {1},
     pages = {49--53}}
    
  34. Y. Chen & V.L.L. Thing
    A Study an the Photo Response Non-uniformity Noise Pattern Based Image Forensics in Real-world Applications
    Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore, Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore, 2012
    BibTeX
    @techreport{Chen2012c,
     author = {Yu Chen and Vrizlynn L. L. Thing},
     title = {A Study an the Photo Response Non-uniformity Noise Pattern Based Image Forensics in Real-world Applications},
     school = {Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore},
     year = {2012}}
    
  35. Z. Chen & Y. Ke
    A Novel Photographic and Computer Graphic Composites Detection Method
    Proc. of the National Conference on Information Technology and Computer Science (CITCS 2012)
    2012
    BibTeX
    @inproceedings{Chen2012e,
     author = {Chen, Zhenwei. and Ke, Yongzhen},
     title = {A Novel Photographic and Computer Graphic Composites Detection Method},
     booktitle = {Proc. of the National Conference on Information Technology and Computer Science (CITCS 2012)},
     year = {2012}}
    
  36. Z. Chen & Z. Zhou
    Source camera identification based on nonsubsampled Contourlet transform denoising filter design
    Journal of Computer Applications, 2012, Vol. 2, pp. 055
    BibTeX
    @article{Chen2012d,
     author = {Chen, Z. and Zhou, Z.},
     title = {Source camera identification based on nonsubsampled Contourlet transform denoising filter design},
     journal = {Journal of Computer Applications},
     year = {2012},
     volume = {2},
     pages = {055}}
    
  37. C.-H. Choi, M.-J. Lee, D.-K. Hyun & H.-K. Lee
    Forged Region Detection for Scanned Images
    J. (Jong Hyuk) Park, J., Chao, H.-C., S. Obaidat, M. & Kim, J. (ed.)
    Computer Science and Convergence
    Springer Netherlands, 2012, Vol. 114, pp. 687-694
    BibTeX
    @incollection{Choi2012,
     author = {Choi, Chang-Hee and Lee, Min-Jeong and Hyun, Dai-Kyung and Lee, Heung-Kyu},
     title = {Forged Region Detection for Scanned Images},
     booktitle = {Computer Science and Convergence},
     publisher = {Springer Netherlands},
     year = {2012},
     volume = {114},
     pages = {687-694}}
    
  38. V. Christlein, C. Riess, J. Jordan, C. Riess & E. Angelopoulou
    An Evaluation of Popular Copy-Move Forgery Detection Approaches
    ArXiv > Computer Science > Computer Vision and Pattern Recognition, 2012
    BibTeX
    @electronic{Christlein2012,
     author = {Vincent Christlein and Christian Riess and Johannes Jordan and Corinna Riess and Elli Angelopoulou},
     title = {An Evaluation of Popular Copy-Move Forgery Detection Approaches},
     journal = {ArXiv > Computer Science > Computer Vision and Pattern Recognition},
     year = {2012}}
    
  39. V. Christlein, C. Riess, J. Jordan, C. Riess & E. Angelopoulou
    An Evaluation of Popular Copy-Move Forgery Detection Approaches
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(6), pp. 1841-1854
    BibTeX
    @article{Christlein2012a,
     author = {Christlein, V. and Riess, C. and Jordan, J. and Riess, C. and Angelopoulou, E.},
     title = {An Evaluation of Popular Copy-Move Forgery Detection Approaches},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {6},
     pages = {1841--1854}}
    
  40. X. Chu, M.C. Stamm, W.S. Lin & K.J.R. Liu
    Forensic identification of compressively sensed images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1837-1840
    BibTeX
    @inproceedings{Chu2012,
     author = {Xiaoyu Chu and Stamm, M. C. and Lin, W. S. and Liu, K. J. R.},
     title = {Forensic identification of compressively sensed images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1837--1840}}
    
  41. W.-H. Chuang
    Resiliency Assessment and Enhancement of Intrinsic Fingerprinting
    Faculty of the Graduate School of the University of Maryland, College Park, Faculty of the Graduate School of the University of Maryland, College Park, 2012
    BibTeX
    @phdthesis{Chuang2012,
     author = {Wei-Hong Chuang},
     title = {Resiliency Assessment and Enhancement of Intrinsic Fingerprinting},
     school = {Faculty of the Graduate School of the University of Maryland, College Park},
     year = {2012}}
    
  42. F. Chunhui, X. Zhengquan & Z. Xinghui
    An Anti-Forensic Algorithm of JPEG Double Compression Based Forgery Detection
    Information Science and Engineering (ISISE), 2012 International Symposium on
    2012, pp. 159-164
    BibTeX
    @inproceedings{Chunhui2012,
     author = {Feng Chunhui and Xu Zhengquan and Zheng Xinghui},
     title = {An Anti-Forensic Algorithm of JPEG Double Compression Based Forgery Detection},
     booktitle = {Information Science and Engineering (ISISE), 2012 International Symposium on},
     year = {2012},
     pages = {159--164}}
    
  43. R. Ciptasari, K.-H. Rhee & K. Sakurai
    An Image Splicing Detection Based on Interpolation Analysis
    Lin, W., Xu, D., Ho, A., Wu, J., He, Y., Cai, J., Kankanhalli, M. & Sun, M.-T. (ed.)
    Advances in Multimedia Information Processing -- PCM 2012
    Springer Berlin Heidelberg, 2012, Vol. 7674, pp. 390-401
    BibTeX
    @incollection{Ciptasari2012,
     author = {Ciptasari, RimbaW. and Rhee, Kyung-Hyune and Sakurai, Kouichi},
     title = {An Image Splicing Detection Based on Interpolation Analysis},
     booktitle = {Advances in Multimedia Information Processing -- PCM 2012},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {7674},
     pages = {390-401}}
    
  44. V. Conotter, J.F. O'Brien & H. Farid
    Exposing Digital Forgeries in Ballistic Motion
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(1), pp. 283-296
    BibTeX
    @article{Conotter2012,
     author = {Conotter, V. and O'Brien, J. F. and Farid, H.},
     title = {Exposing Digital Forgeries in Ballistic Motion},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {1},
     pages = {283--296}}
    
  45. D. Cozzolino, G. Poggi, C. Sansone & L. Verdoliva
    A Comparative Analysis of Forgery Detection Algorithms
    International Workshops on Statistical Techniques in Pattern Recognition, LNCS 7626
    2012
    BibTeX
    @inproceedings{Cozzolino2012,
     author = {D. Cozzolino and G. Poggi and C. Sansone and L. Verdoliva},
     title = {A Comparative Analysis of Forgery Detection Algorithms},
     booktitle = {International Workshops on Statistical Techniques in Pattern Recognition, LNCS 7626},
     year = {2012}}
    
  46. D.T. Dang-Nguyen, G. Boato & F.D.N.D. Natale
    Discrimination Between Computer Generated and Natural Human Faces Based on Asymmetry Information
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012, pp. 1234-1238
    BibTeX
    @inproceedings{Dang-Nguyen2012,
     author = {D. T. Dang-Nguyen and G. Boato and F. D. N. De Natale},
     title = {Discrimination Between Computer Generated and Natural Human Faces Based on Asymmetry Information},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012},
     pages = {1234-1238}}
    
  47. Y. Deng, Y. Wu & L. Zhou
    Detection of Copy-Rotate-Move Forgery Using Dual Tree Complex Wavelet Transform
    Advanced Science Letters, 2012, Vol. 16(1), pp. 32-38
    BibTeX
    @article{Deng:2012:1936-6612:32,
     author = {Deng, Yu and Wu, Yunjie and Zhou, Linna},
     title = {Detection of Copy-Rotate-Move Forgery Using Dual Tree Complex Wavelet Transform},
     journal = {Advanced Science Letters},
     year = {2012},
     volume = {16},
     number = {1},
     pages = {32-38}}
    
  48. P. Deshpande & P. Kanikar
    Pixel Based Digital Image Forgery Detection Techniques
    International Journal of Engineering Research and Applications (IJERA), 2012, Vol. 2(3), pp. 539-543
    BibTeX
    @article{Deshpande2012,
     author = {Pradyumna Deshpande and Prashasti Kanikar},
     title = {Pixel Based Digital Image Forgery Detection Techniques},
     journal = {International Journal of Engineering Research and Applications (IJERA)},
     year = {2012},
     volume = {2},
     number = {3},
     pages = {539-543}}
    
  49. Z.-L. Du, X.-L. Li, L.-X. Jiao & K. Shen
    Region duplication blind detection based on multiple feature combination
    Machine Learning and Cybernetics (ICMLC), 2012 International Conference on
    2012, Vol. 1, pp. 17-21
    BibTeX
    @inproceedings{Du2012,
     author = {Zhen-Long Du and Xiao-Li Li and Li-Xin Jiao and Kangkang Shen},
     title = {Region duplication blind detection based on multiple feature combination},
     booktitle = {Machine Learning and Cybernetics (ICMLC), 2012 International Conference on},
     year = {2012},
     volume = {1},
     pages = {17--21}}
    
  50. J. Eklann & J. Lundberg
    Source Camera Classification and Clustering from Sensor Pattern Noise
    2012
    BibTeX
    @article{Eklann2012,
     author = {Eklann, J. and Lundberg, J.},
     title = {Source Camera Classification and Clustering from Sensor Pattern Noise},
     year = {2012}}
    
  51. G. Fahmy
    Detectable Tampering of JPEG Anti-Forensics
    2012, pp. 1-4
    BibTeX
    @misc{Fahmy2012,
     author = {Fahmy, Gamal},
     title = {Detectable Tampering of JPEG Anti-Forensics},
     year = {2012},
     pages = {1--4}}
    
  52. W. Fan, K. Wang, F. Cayre & Z. Xiong
    3D Lighting-Based Image Forgery Detection Using Shape-From-Shading
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012, pp. 1777-1781
    BibTeX
    @inproceedings{Fan2012,
     author = {W. Fan and K. Wang and F. Cayre and Z. Xiong},
     title = {3D Lighting-Based Image Forgery Detection Using Shape-From-Shading},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012},
     pages = {1777-1781}}
    
  53. H. Farid & M.J. Bravo
    Perceptual discrimination of computer generated and photographic faces
    Digital Investigation, 2012, Vol. 8(3-4), pp. 226 - 235
    BibTeX
    @article{Farid2012,
     author = {Hany Farid and Mary J. Bravo},
     title = {Perceptual discrimination of computer generated and photographic faces},
     journal = {Digital Investigation},
     year = {2012},
     volume = {8},
     number = {3--4},
     pages = {226 - 235}}
    
  54. J.E. Farrell, P.B. Catrysse & B.A. Wandell
    Digital camera simulation
    Applied Optics, 2012, Vol. 51(4), pp. A80-A90
    BibTeX
    @article{Farrell2012,
     author = {Joyce E. Farrell and Peter B. Catrysse and Brian A. Wandell},
     title = {Digital camera simulation},
     journal = {Applied Optics},
     year = {2012},
     volume = {51},
     number = {4},
     pages = {A80-A90}}
    
  55. X. Feng, I.J. Cox & G. Doerr
    Normalized Energy Density-Based Forensic Detection of Resampled Images
    IEEE Transactions on Multimedia, 2012, Vol. 14(3), pp. 536-545
    BibTeX
    @article{Feng2012,
     author = {Feng, X. and Cox, I. J. and Doerr, G. },
     title = {Normalized Energy Density-Based Forensic Detection of Resampled Images},
     journal = {IEEE Transactions on Multimedia},
     year = {2012},
     volume = {14},
     number = {3},
     pages = {536--545}}
    
  56. P. Ferrara, T. Bianchi, A. De Rosa & A. Piva
    Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(5), pp. 1566-1577
    BibTeX
    @article{Ferrara2012,
     author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro },
     title = {Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {5},
     pages = {1566--1577}}
    
  57. M. Fontani & M. Barni
    Hiding Traces of Median Filtering in Digital Images
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012
    BibTeX
    @inproceedings{Fontani2012,
     author = {M. Fontani and M. Barni},
     title = {Hiding Traces of Median Filtering in Digital Images},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012}}
    
  58. I. Franc & M. Stojmenovic
    Techniques of image manipulation and detection of copy-move attack
    Telecommunications Forum (TELFOR), 2012 20th
    2012, pp. 1625-1628
    BibTeX
    @inproceedings{Franc2012,
     author = {Franc, I. and Stojmenovic, M.},
     title = {Techniques of image manipulation and detection of copy-move attack},
     booktitle = {Telecommunications Forum (TELFOR), 2012 20th},
     year = {2012},
     pages = {1625--1628}}
    
  59. J. Fridrich
    Sensor Defects in Digital Image Forensic
    Chapter 1: Sensor Defects in Digital Image Forensic
    2012
    BibTeX
    @unpublished{Fridrich2012,
     author = {Jessica Fridrich},
     title = {Sensor Defects in Digital Image Forensic},
     year = {2012}}
    
  60. H. Fu & X. Cao
    Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1301-1314
    BibTeX
    @article{Fu2012,
     author = {Huazhu Fu and Xiaochun Cao},
     title = {Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {4},
     pages = {1301--1314}}
    
  61. L. Fu & Y. Qi
    Camera Response Function Estimation and Application with a Single Image
    Yang, D. (ed.)
    Informatics in Control, Automation and Robotics
    Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg, 2012, Vol. 133, pp. 149-156
    BibTeX
    @incollection{Fu2012a,
     author = {Fu, Li and Qi, Yue},
     title = {Camera Response Function Estimation and Application with a Single Image},
     booktitle = {Informatics in Control, Automation and Robotics},
     journal = {Lecture Notes in Electrical Engineering},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {133},
     pages = {149-156}}
    
  62. S. Gao, R. Hu & G. Tian
    Using Multi-step Transition Matrices for Camera Model Identification
    International Journal of Hybrid Information Technology, 2012, Vol. 5(2), pp. 275-288
    BibTeX
    @article{Gao2012a,
     author = {Gao, S. and Hu, R.M. and Tian, G.},
     title = {Using Multi-step Transition Matrices for Camera Model Identification},
     journal = {International Journal of Hybrid Information Technology},
     year = {2012},
     volume = {5},
     number = {2},
     pages = {275--288}}
    
  63. S. Gao, G. Xu & R.-M. Hu
    Camera Model Identification Based on the Characteristic of CFA and Interpolation
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 268-280
    BibTeX
    @incollection{Gao2012,
     author = {Gao, Shang and Xu, Guanshuo and Hu, Rui-Min},
     title = {Camera Model Identification Based on the Characteristic of CFA and Interpolation},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {268-280}}
    
  64. F. Gisolf
    Research on PRNU
    Nederlands Forensisch Instituut, Nederlands Forensisch Instituut, 2012
    BibTeX
    @techreport{Gisolf2012,
     author = {Floris Gisolf},
     title = {Research on PRNU},
     school = {Nederlands Forensisch Instituut},
     year = {2012}}
    
  65. T. Gloe
    Forensic analysis of ordered data structures on the example of JPEG files
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2012, pp. 139-144
    BibTeX
    @inproceedings{Gloe2012,
     author = {Gloe, Thomas},
     title = {Forensic analysis of ordered data structures on the example of JPEG files},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2012},
     pages = {139--144}}
    
  66. T. Gloe, S. Pfennig & M. Kirchner
    Unexpected artefacts in PRNU-based camera identification: a ´Dresden Image Database´ case-study
    Proceedings of the on Multimedia and security
    ACM, 2012, pp. 109-114
    BibTeX
    @inproceedings{Gloe2012a,
     author = {Gloe, Thomas and Pfennig, Stefan and Kirchner, Matthias},
     title = {Unexpected artefacts in PRNU-based camera identification: a ´Dresden Image Database´ case-study},
     booktitle = {Proceedings of the on Multimedia and security},
     publisher = {ACM},
     year = {2012},
     pages = {109--114}}
    
  67. N. Glumov & A. Kuznetsov
    Analysis of images for local artificial changes with JPEG compression properties
    Pattern Recognition and Image Analysis, MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC., 2012, Vol. 22, pp. 210-214
    BibTeX
    @article{Glumov2012,
     author = {Glumov, N. and Kuznetsov, A.},
     title = {Analysis of images for local artificial changes with JPEG compression properties},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.},
     year = {2012},
     volume = {22},
     pages = {210-214}}
    
  68. M. Goljan & J. Fridrich
    Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion
    Proceedings of SPIE, 2012
    BibTeX
    @article{Goljan2012,
     author = {Miroslav Goljan and Jessica Fridrich},
     title = {Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion},
     journal = {Proceedings of SPIE},
     year = {2012}}
    
  69. W. Gong, X. Wu & T. Wu
    Fakery Image Identifying Using Lighting Direction
    Journal of Information & Computational Science, 2012, Vol. 9(7), pp. 1949-1955
    BibTeX
    @article{Gong2012,
     author = {Wenyong Gong and Xinglong Wu and Tieru Wu},
     title = {Fakery Image Identifying Using Lighting Direction},
     journal = {Journal of Information & Computational Science},
     year = {2012},
     volume = {9},
     number = {7},
     pages = {1949-1955}}
    
  70. J.-M. Guo, Y.-F. Liu & Z.-J. Wu
    Duplication Forgery Detection Using Improved DAISY Descriptor
    Expert Systems with Applications, 2012, Vol. -(0), pp. -
    BibTeX
    @article{Guo2012,
     author = {Jing-Ming Guo and Yun-Fu Liu and Zong-Jhe Wu},
     title = {Duplication Forgery Detection Using Improved DAISY Descriptor},
     journal = {Expert Systems with Applications},
     year = {2012},
     volume = {-},
     number = {0},
     pages = {-}}
    
  71. M.U. Gutmann & A.H. arinen
    Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics
    Journal of Machine Learning Research, 2012, Vol. 13, pp. 307-361
    BibTeX
    @article{Gutmann2012,
     author = {Michael U. Gutmann and Aapo Hyv¨ arinen},
     title = {Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics},
     journal = {Journal of Machine Learning Research},
     year = {2012},
     volume = {13},
     pages = {307-361}}
    
  72. Z. He, W. Lu, W. Sun & J. Huang
    Digital image splicing detection based on Markov features in DCT and DWT domain
    Pattern Recognition, 2012(0), pp. -
    BibTeX
    @article{He2012,
     author = {Zhongwei He and Wei Lu and Wei Sun and Jiwu Huang},
     title = {Digital image splicing detection based on Markov features in DCT and DWT domain},
     journal = {Pattern Recognition},
     year = {2012},
     number = {0},
     pages = { - }}
    
  73. D.M. Hou, Z.Y. Bai & S.C. Liu
    A New Algorithm for Image Copy-Move Forgery Detection
    Materials Science and Information Technology, 2012, Vol. 433-440, pp. 5930-5934
    BibTeX
    @article{Hou2012,
     author = {Dong Mei Hou and Zheng Yao Bai and Shu Chun Liu},
     title = {A New Algorithm for Image Copy-Move Forgery Detection},
     journal = {Materials Science and Information Technology},
     year = {2012},
     volume = {433-440},
     pages = {5930-5934}}
    
  74. W. van Houten & Z. Geradts
    Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification
    Journal of Forensic Sciences, 2012, Vol. 57(2), pp. 512-527
    BibTeX
    @article{Houten2012,
     author = {Wiger van Houten and Zeno Geradts},
     title = {Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification},
     journal = {Journal of Forensic Sciences},
     year = {2012},
     volume = {57},
     number = {2},
     pages = {512-527}}
    
  75. C.-J. Hsieh, J.-S. Li & W.-C. Liu
    Digital evidence collection for web image access
    Security and Communication Networks, Wiley Online Library, 2012
    BibTeX
    @article{Hsieh2012,
     author = {Hsieh, Che-Jen and Li, Jung-Shian and Liu, Wei-Cheng},
     title = {Digital evidence collection for web image access},
     journal = {Security and Communication Networks},
     publisher = {Wiley Online Library},
     year = {2012}}
    
  76. H.-C. Hsu & M.-S. Wang
    Detection of copy-move forgery image using Gabor descriptor
    Proc. Int Anti-Counterfeiting, Security and Identification (ASID) Conf
    2012, pp. 1-4
    BibTeX
    @inproceedings{Hsu2012,
     author = {Hao-Chiang Hsu and Min-Shi Wang},
     title = {Detection of copy-move forgery image using Gabor descriptor},
     booktitle = {Proc. Int Anti-Counterfeiting, Security and Identification (ASID) Conf},
     year = {2012},
     pages = {1--4}}
    
  77. Y. Hu, C.-T. Li, Z. Lai & S. Zhang
    Fast camera fingerprint search algorithm for source camera identification
    Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
    2012, pp. 1-5
    BibTeX
    @inproceedings{Hu2012,
     author = {Yongjian Hu and Chang-Tsun Li and Zhimao Lai and Shangfan Zhang},
     title = {Fast camera fingerprint search algorithm for source camera identification},
     booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp},
     year = {2012},
     pages = {1--5}}
    
  78. Y. Hu, C.-T. Li, X. Lin & B.-b. Liu
    An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces
    Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2012, pp. 325-330
    BibTeX
    @inproceedings{Hu2012b,
     author = {Hu, Yongjian and Li, Chang-Tsun and Lin, Xufeng and Liu, Bei-bei},
     title = {An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces},
     booktitle = {Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2012},
     pages = {325--330}}
    
  79. H. Huang, G. Coatrieux, H. Shu, L. Luo & C. Roux
    Blind Integrity Verification of Medical Images
    IEEE Transactions on Information Technology in Biomedicine, 2012, Vol. 16(6), pp. 1122-1126
    BibTeX
    @article{Huang2012,
     author = {Huang, H. and Coatrieux, G. and Shu, H. and Luo, L. and Roux, C. },
     title = {Blind Integrity Verification of Medical Images},
     journal = {IEEE Transactions on Information Technology in Biomedicine},
     year = {2012},
     volume = {16},
     number = {6},
     pages = {1122--1126}}
    
  80. M. Hussain, G. Muhammad, S.Q. Saleh, A.M. Mirza & G. Bebis
    Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors
    Proc. Eighth Int Signal Image Technology and Internet Based Systems (SITIS) Conf
    2012, pp. 395-401
    BibTeX
    @inproceedings{Hussain2012,
     author = {Hussain, Muhammad and Muhammad, Ghulam and Saleh, Sahar Q. and Mirza, Anwar M. and Bebis, George},
     title = {Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors},
     booktitle = {Proc. Eighth Int Signal Image Technology and Internet Based Systems (SITIS) Conf},
     year = {2012},
     pages = {395--401}}
    
  81. M.-G. Hwang & D.-H. Har
    A Novel Forged Image Detection Method Using the Characteristics of Interpolation
    Journal of Forensic Sciences, 2012, Vol. -, pp. -
    BibTeX
    @article{Hwang2012,
     author = {Hwang, Min-Gu and Har, Dong-Hwan},
     title = {A Novel Forged Image Detection Method Using the Characteristics of Interpolation},
     journal = {Journal of Forensic Sciences},
     year = {2012},
     volume = {-},
     pages = {-}}
    
  82. D.-K. Hyun, C.-H. Choi & H.-K. Lee
    Camcorder Identification for Heavily Compressed Low Resolution Videos
    J. (Jong Hyuk) Park, J. J. (J. H., Chao, H.-C., S. Obaidat, M. S. & Kim, J. (ed.)
    Computer Science and Convergence
    Springer Netherlands, 2012, Vol. 114, pp. 695-701
    BibTeX
    @incollection{Hyun2012,
     author = {Hyun, Dai-Kyung and Choi, Chang-Hee and Lee, Heung-Kyu},
     title = {Camcorder Identification for Heavily Compressed Low Resolution Videos},
     booktitle = {Computer Science and Convergence},
     publisher = {Springer Netherlands},
     year = {2012},
     volume = {114},
     pages = {695-701}}
    
  83. L. Jing & C. Shao
    Image Copy-Move Forgery Detecting Based on Local Invariant Feature
    Journal of Multimedia, 2012, Vol. 7(1), pp. 90-97
    BibTeX
    @article{Jing2012,
     author = {Li Jing and Chao Shao},
     title = {Image Copy-Move Forgery Detecting Based on Local Invariant Feature},
     journal = {Journal of Multimedia},
     year = {2012},
     volume = {7},
     number = {1},
     pages = {90-97}}
    
  84. D.-J. Jung, D.-K. Hyun, S.-J. Ryu, J.-W. Lee, H.-Y. Lee & H.-K. Lee
    Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 281-291
    BibTeX
    @incollection{Jung2012,
     author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Ryu, Seung-Jin and Lee, Ji-Won and Lee, Hae-Yeoun and Lee, Heung-Kyu},
     title = {Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {281-291}}
    
  85. P. Kakar & N. Sudha
    Exposing Postprocessed Copy--Paste Forgeries Through Transform-Invariant Features
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1018-1028
    BibTeX
    @article{Kakar2012,
     author = {Kakar, P. and Sudha, N. },
     title = {Exposing Postprocessed Copy--Paste Forgeries Through Transform-Invariant Features},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {3},
     pages = {1018--1028}}
    
  86. P. Kakar & N. Sudha
    Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2012, pp. 236-241
    BibTeX
    @inproceedings{Kakar2012a,
     author = {Kakar, P. and Sudha, N. },
     title = {Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2012},
     pages = {236--241}}
    
  87. P. Kakar & N. Sudha
    Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1029-1039
    BibTeX
    @article{Kakar2012b,
     author = {Kakar, P. and Sudha, N.},
     title = {Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {3},
     pages = {1029--1039}}
    
  88. K. Kancherla & S. Mukkamala
    Novel Blind Video Forgery Detection Using Markov Models on Motion Residue
    Pan, J.-S., Chen, S.-M. & Nguyen, N. (ed.)
    Intelligent Information and Database Systems
    Springer Berlin / Heidelberg, 2012, Vol. 7198, pp. 308-315
    BibTeX
    @incollection{Kancherla2012,
     author = {Kancherla, Kesav and Mukkamala, Srinivas},
     title = {Novel Blind Video Forgery Detection Using Markov Models on Motion Residue},
     booktitle = {Intelligent Information and Database Systems},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7198},
     pages = {308-315}}
    
  89. X. Kang, Y. Li, Z. Qu & J. Huang
    Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(2), pp. 393-402
    BibTeX
    @article{Kang2012,
     author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang},
     title = {Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {2},
     pages = {393--402}}
    
  90. X. Kang, M. Stamm, A. Peng & K. Liu
    Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual
    2012
    BibTeX
    @article{Kang2012a,
     author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.},
     title = {Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual},
     year = {2012}}
    
  91. Y.T. Kao, H.J. Lin, C.W. Wang & Y.C. Pai
    Effective Detection for Linear Up-Sampling by a Factor of Fraction
    IEEE Transactions on Image Processing, 2012, Vol. 21(8), pp. 3443-3453
    BibTeX
    @article{Kao2012,
     author = {Yang Ta Kao and Hwei Jen Lin and Chun Wei Wang and Yi Chun Pai},
     title = {Effective Detection for Linear Up-Sampling by a Factor of Fraction},
     journal = {IEEE Transactions on Image Processing},
     year = {2012},
     volume = {21},
     number = {8},
     pages = {3443--3453}}
    
  92. C.S. Kohler
    Updates to Policies and Procedures Related to Potential Scientific and Academic Misconduct in the Journals of the American Diabetes Association
    Diabetes Care, 2012, Vol. 35(1), pp. 189-190
    BibTeX
    @article{Kohler2012,
     author = {Christian S. Kohler},
     title = {Updates to Policies and Procedures Related to Potential Scientific and Academic Misconduct in the Journals of the American Diabetes Association},
     journal = {Diabetes Care},
     year = {2012},
     volume = {35},
     number = {1},
     pages = {189-190}}
    
  93. C.-W. Kwok, O. Au & S.-H. Chui
    Alternative Anti-Forensics Method for Contrast Enhancement
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 398-410
    BibTeX
    @incollection{Kwok2012,
     author = {Kwok, Chun-Wing and Au, O. and Chui, Sung-Him},
     title = {Alternative Anti-Forensics Method for Contrast Enhancement},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {398-410}}
    
  94. J.-F. Lalonde, A. Efros & S. Narasimhan
    Estimating the Natural Illumination Conditions from a Single Outdoor Image
    International Journal of Computer Vision, Springer US, 2012, Vol. 98, pp. 123-145
    BibTeX
    @article{Lalonde2012,
     author = {Lalonde, Jean-François and Efros, AlexeiA. and Narasimhan, SrinivasaG.},
     title = {Estimating the Natural Illumination Conditions from a Single Outdoor Image},
     journal = {International Journal of Computer Vision},
     publisher = {Springer US},
     year = {2012},
     volume = {98},
     pages = {123-145}}
    
  95. M. Lebrun, M. Colom, A. Buades & J.M. Morel
    Secrets of image denoising cuisine
    Acta Numerica, 2012, Vol. 21, pp. 475-576
    BibTeX
    @article{Lebrun2012,
     author = {M. Lebrun and M. Colom and A. Buades and J. M. Morel},
     title = {Secrets of image denoising cuisine},
     journal = {Acta Numerica},
     year = {2012},
     volume = {21},
     pages = {475-576}}
    
  96. A.B. Lewis
    Reconstructing compressed photo and video data
    University of Cambridge - Computer Laboratory, University of Cambridge - Computer Laboratory, 2012(813)
    BibTeX
    @techreport{Lewis2012,
     author = {Andrew B. Lewis},
     title = {Reconstructing compressed photo and video data},
     school = {University of Cambridge - Computer Laboratory},
     year = {2012},
     number = {813}}
    
  97. C. Li & R. Satta
    An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise
    Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK, Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK, 2012
    BibTeX
    @techreport{Li2012b,
     author = {Li, C.T. and Satta, R.},
     title = {An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise},
     school = {Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK},
     year = {2012}}
    
  98. C.-T. Li & Y. Li
    Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics
    IEEE Transactions on Circuits and Systems for Video Technology, 2012, Vol. 22(2), pp. 260-271
    BibTeX
    @article{Li2012,
     author = {Chang-Tsun Li and Yue Li},
     title = {Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2012},
     volume = {22},
     number = {2},
     pages = {260--271}}
    
  99. H. Li & J. Zheng
    Blind Detection of Digital Forgery Image Based on the Edge Width
    Zhang, Y., Zhou, Z.-H., Zhang, C. & Li, Y. (ed.)
    Intelligent Science and Intelligent Data Engineering
    Springer Berlin / Heidelberg, 2012, Vol. 7202, pp. 546-553
    BibTeX
    @incollection{Li2012c,
     author = {Li, Hang and Zheng, Jiangbin},
     title = {Blind Detection of Digital Forgery Image Based on the Edge Width},
     booktitle = {Intelligent Science and Intelligent Data Engineering},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7202},
     pages = {546-553}}
    
  100. L. Li, S. Li & J. Wang
    Copy-move forgery detection based on PHT
    Proc. World Congress Information and Communication Technologies (WICT)
    2012, pp. 1061-1065
    BibTeX
    @inproceedings{Li2012e,
     author = {Li, Leida and Li, Shushang and Wang, Jun},
     title = {Copy-move forgery detection based on PHT},
     booktitle = {Proc. World Congress Information and Communication Technologies (WICT)},
     year = {2012},
     pages = {1061--1065}}
    
  101. X.H. Li, Y.Q. Zhao, M. Liao & S.Y. Q
    Detection of tampered region for JPEG images by using mode-based first digit features
    EURASIP Journal on Advances in Signal Processing, 2012, Vol. 1(190)
    BibTeX
    @article{Li2012a,
     author = {Li, Xiang Hua and Zhao, Yu Qian and Liao, Miao and Shi Yun Q},
     title = {Detection of tampered region for JPEG images by using mode-based first digit features},
     journal = {EURASIP Journal on Advances in Signal Processing},
     year = {2012},
     volume = {1},
     number = {190}}
    
  102. X.-h. Li, Y.-q. Zhao, M. Liao, F. Shih & Y. Shi
    Passive detection of copy-paste forgery between JPEG images
    Journal of Central South University, Central South University, 2012, Vol. 19, pp. 2839-2851
    BibTeX
    @article{Li2012d,
     author = {Li, Xiang-hua and Zhao, Yu-qian and Liao, Miao and Shih, F.Y. and Shi, Y.Q.},
     title = {Passive detection of copy-paste forgery between JPEG images},
     journal = {Journal of Central South University},
     publisher = {Central South University},
     year = {2012},
     volume = {19},
     pages = {2839-2851}}
    
  103. H. Ling, H. Cheng, Q. Ma, F. Zou & W. Yan
    Efficient Image Copy Detection Using Multiscale Fingerprints
    IEEE Multimedia, 2012, Vol. 19(1), pp. 60-69
    BibTeX
    @article{Ling2012,
     author = {Hefei Ling and Hongrui Cheng and Qingzhen Ma and Fuhao Zou and WeiQi Yan},
     title = {Efficient Image Copy Detection Using Multiscale Fingerprints},
     journal = {IEEE Multimedia},
     year = {2012},
     volume = {19},
     number = {1},
     pages = {60--69}}
    
  104. H. Liu, Y. Yang & M. Shang
    Blind detection of image splicing based on run length matrix combined properties
    Proc. 10th World Congress Intelligent Control and Automation (WCICA)
    2012, pp. 4545-4550
    BibTeX
    @inproceedings{Liu2012a,
     author = {Liu, Han and Yang, Yun and Shang, Minqing},
     title = {Blind detection of image splicing based on run length matrix combined properties},
     booktitle = {Proc. 10th World Congress Intelligent Control and Automation (WCICA)},
     year = {2012},
     pages = {4545--4550}}
    
  105. Q. Liu, X. Li, L. Chen, H. Cho, P. Cooper, Z. Chen, M. Qiao & A. Sung
    Identification of Smartphone-Image Source and Manipulation
    Jiang, H., Ding, W., Ali, M. & Wu, X. (ed.)
    Advanced Research in Applied Artificial Intelligence
    Springer Berlin / Heidelberg, 2012, Vol. 7345, pp. 262-271
    BibTeX
    @incollection{Liu2012,
     author = {Liu, Qingzhong and Li, Xiaodong and Chen, Lei and Cho, Hyuk and Cooper, Peter and Chen, Zhongxue and Qiao, Mengyu and Sung, Andrew},
     title = {Identification of Smartphone-Image Source and Manipulation},
     booktitle = {Advanced Research in Applied Artificial Intelligence},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7345},
     pages = {262-271}}
    
  106. M. Long, T. Peng & F. Peng
    A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity
    Journal of Computational Information Systems, 2012, Vol. 8(4), pp. 1433-1440
    BibTeX
    @article{Long2012,
     author = {Min Long and Ting Peng and Fei Peng},
     title = {A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity},
     journal = {Journal of Computational Information Systems},
     year = {2012},
     volume = {8},
     number = {4},
     pages = {1433-1440}}
    
  107. M.V. Malakooti, A. Pahlavan Tafti, F. Rohani & M.A. Moghaddasifar
    RGB digital image forgery detection using Singular Value Decomposition and One Dimensional Cellular Automata
    Proc. 8th Int Computing Technology and Information Management (ICCM) Conf
    2012, Vol. 1, pp. 483-488
    BibTeX
    @inproceedings{Malakooti2012,
     author = {Malakooti, Mohammad V. and Pahlavan Tafti, Ahmad and Rohani, Faezeh and Moghaddasifar, Mohammad Amin},
     title = {RGB digital image forgery detection using Singular Value Decomposition and One Dimensional Cellular Automata},
     booktitle = {Proc. 8th Int Computing Technology and Information Management (ICCM) Conf},
     year = {2012},
     volume = {1},
     pages = {483--488}}
    
  108. V. Mall, K. Bhatt, S.K. Mitra & A.K. Roy
    Exposing structural tampering in digital images
    Proc. IEEE Int Signal Processing, Computing and Control (ISPCC) Conf
    2012, pp. 1-6
    BibTeX
    @inproceedings{Mall2012,
     author = {Mall, V. and Bhatt, K. and Mitra, S. K. and Roy, A. K. },
     title = {Exposing structural tampering in digital images},
     booktitle = {Proc. IEEE Int Signal Processing, Computing and Control (ISPCC) Conf},
     year = {2012},
     pages = {1--6}}
    
  109. A. Malviya & S. Sandlake
    A Review on Passive Approach for Image Manipulation Detection Techniques for Copy Move Forgery
    Journal of Computing Technologies, 2012, Vol. 1(2), pp. -
    BibTeX
    @article{Malviya2012,
     author = {A.V. Malviya and S.A. Sandlake},
     title = {A Review on Passive Approach for Image Manipulation Detection Techniques for Copy Move Forgery},
     journal = {Journal of Computing Technologies},
     year = {2012},
     volume = {1},
     number = {2},
     pages = {-}}
    
  110. S. Milani, M. Tagliasacchi & S. Tubaro
    Discriminating multiple JPEG compression using first digit features
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 2253-2256
    BibTeX
    @inproceedings{Milani2012,
     author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Discriminating multiple JPEG compression using first digit features},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {2253--2256}}
    
  111. U. Mudenagudi, L.M., A.U., H. Holalad & M.S.D.
    Detection of doctored images
    International Journal of Current Engineering and Technology
    International Journal of Current Engineering and Technology, ACM, 2012
    BibTeX
    @article{Mudenagudi2012,
     author = {Uma Mudenagudi and Lalitha M. and Ananya U. and Harsh Holalad and Muktanidhi S. D.},
     title = {Detection of doctored images},
     booktitle = {International Journal of Current Engineering and Technology},
     journal = {International Journal of Current Engineering and Technology},
     publisher = {ACM},
     year = {2012}}
    
  112. G. Muhammad, M. Hussain & G. Bebis
    Passive copy move image forgery detection using undecimated dyadic wavelet transform
    Digital Investigation, 2012(0), pp. -
    BibTeX
    @article{Muhammad2012,
     author = {Ghulam Muhammad and Muhammad Hussain and George Bebis},
     title = {Passive copy move image forgery detection using undecimated dyadic wavelet transform},
     journal = {Digital Investigation},
     year = {2012},
     number = {0},
     pages = { - }}
    
  113. G. Muhammad, M. Hussain, A.M. Mirza & G. Bebis
    Dyadic wavelets and DCT based blind copy-move image forgery detection
    Proc. IET Conf. Image Processing (IPR 2012)
    2012, pp. 1-6
    BibTeX
    @inproceedings{Muhammad2012a,
     author = {Muhammad, Ghulam and Hussain, Muhammad and Mirza, Anwar M. and Bebis, George},
     title = {Dyadic wavelets and DCT based blind copy-move image forgery detection},
     booktitle = {Proc. IET Conf. Image Processing (IPR 2012)},
     year = {2012},
     pages = {1--6}}
    
  114. S. Murali, B.S. Anami & G.B. Chittapur
    Detection of digital photo image forgery
    Proc. IEEE Int Advanced Communication Control and Computing Technologies (ICACCCT) Conf
    2012, pp. 120-124
    BibTeX
    @inproceedings{Murali2012a,
     author = {Murali, S. and Anami, B. S. and Chittapur, G. B. },
     title = {Detection of digital photo image forgery},
     booktitle = {Proc. IEEE Int Advanced Communication Control and Computing Technologies (ICACCCT) Conf},
     year = {2012},
     pages = {120--124}}
    
  115. S. Murali, G.B. Chittapur & H.S. Prabhakara
    Format based photo forgery image detection
    Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
    ACM, 2012, pp. 452-457
    BibTeX
    @inproceedings{Murali2012,
     author = {Murali, S. and Chittapur, Govindraj B. and Prabhakara, H. S.},
     title = {Format based photo forgery image detection},
     booktitle = {Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology},
     publisher = {ACM},
     year = {2012},
     pages = {452--457}}
    
  116. O. Muratov, D.-T. Dang-Nguyen, G. Boato & F.G.B. De Natale
    Saliency detection as a support for image forensics
    Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
    2012, pp. 1-5
    BibTeX
    @inproceedings{Muratov2012,
     author = {Muratov, O. and Duc-Tien Dang-Nguyen and Boato, Giulia and De Natale, F. G. B. },
     title = {Saliency detection as a support for image forensics},
     booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp},
     year = {2012},
     pages = {1--5}}
    
  117. H. Nguyen & S. Katzenbeisser
    Robust Resampling Detection in Digital Images
    De Decker, B. & Chadwick, D. (ed.)
    Communications and Multimedia Security
    Springer Berlin / Heidelberg, 2012, Vol. 7394, pp. 3-15
    BibTeX
    @incollection{Nguyen2012b,
     author = {Nguyen, Hieu and Katzenbeisser, Stefan},
     title = {Robust Resampling Detection in Digital Images},
     booktitle = {Communications and Multimedia Security},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7394},
     pages = {3-15}}
    
  118. H. Nguyen & S. Katzenbeisser
    Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 387-397
    BibTeX
    @incollection{Nguyen2012a,
     author = {Nguyen, Hieu and Katzenbeisser, Stefan},
     title = {Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {387-397}}
    
  119. H.C. Nguyen & S. Katzenbeisser
    Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation
    Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2012, pp. 134-137
    BibTeX
    @inproceedings{Nguyen2012,
     author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan},
     title = {Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation},
     booktitle = {Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2012},
     pages = {134--137}}
    
  120. J.F. O´Brien & H. Farid
    Exposing photo manipulation with inconsistent reflections
    ACM Trans. Graph., ACM, 2012, Vol. 31(1), pp. 4:1-4:11
    BibTeX
    @article{OBrien2012,
     author = {O´Brien, James F. and Farid, Hany},
     title = {Exposing photo manipulation with inconsistent reflections},
     journal = {ACM Trans. Graph.},
     publisher = {ACM},
     year = {2012},
     volume = {31},
     number = {1},
     pages = {4:1--4:11}}
    
  121. L. Özparlak & I. Avcibas
    Image manipulation detection using contourlet transform
    Proc. 20th Signal Processing and Communications Applications Conf. (SIU)
    2012, pp. 1-4
    BibTeX
    @inproceedings{Ozparlak2012,
     author = {Özparlak, L. and Avcibas, I.},
     title = {Image manipulation detection using contourlet transform},
     booktitle = {Proc. 20th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2012},
     pages = {1--4}}
    
  122. X. Pan, X. Zhang & S. Lyu
    Exposing image splicing with inconsistent local noise variances
    Proc. IEEE Int Computational Photography (ICCP) Conf
    2012, pp. 1-10
    BibTeX
    @inproceedings{Pan2012,
     author = {Xunyu Pan and Xing Zhang and Siwei Lyu},
     title = {Exposing image splicing with inconsistent local noise variances},
     booktitle = {Proc. IEEE Int Computational Photography (ICCP) Conf},
     year = {2012},
     pages = {1--10}}
    
  123. X. Pan, X. Zhang & S. Lyu
    Detecting splicing in digital audios using local noise level estimation
    Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on
    2012, pp. 1841-1844
    BibTeX
    @inproceedings{Pan2012a,
     author = {Xunyu Pan and Xing Zhang and Siwei Lyu},
     title = {Detecting splicing in digital audios using local noise level estimation},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on},
     year = {2012},
     pages = {1841--1844}}
    
  124. F. Peng, J. Liu & M. Long
    Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features
    International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 4(1), pp. 1-16
    BibTeX
    @article{Peng2012,
     author = {Fei Peng and Juan Liu and Min Long},
     title = {Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2012},
     volume = {4},
     number = {1},
     pages = {1-16}}
    
  125. S. Pfennig & M. Kirchner
    Spectral methods to determine the exact scaling factor of resampled digital images
    Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
    2012, pp. 1-6
    BibTeX
    @inproceedings{Pfennig2012,
     author = {Pfennig, S. and Kirchner, M.},
     title = {Spectral methods to determine the exact scaling factor of resampled digital images},
     booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp},
     year = {2012},
     pages = {1--6}}
    
  126. V.S. Pujari & M. Sohani
    A Comparative Analysis on Copy Move Forgery Detection in Spatial Domain Method Using Lexicographic and Non Lexicographic techniques
    IJECCE, 2012, Vol. 3(1), pp. -
    BibTeX
    @article{Pujari2012,
     author = {Vidya S. Pujari and Mandar Sohani},
     title = {A Comparative Analysis on Copy Move Forgery Detection in Spatial Domain Method Using Lexicographic and Non Lexicographic techniques},
     journal = {IJECCE},
     year = {2012},
     volume = {3},
     number = {1},
     pages = {-}}
    
  127. G. Qadir, S. Yahaya & A.T.S. Ho
    Surrey University Library for Forensic Analysis (SULFA) of video content
    Proc. IET Conf. Image Processing (IPR 2012)
    2012, pp. 1-6
    BibTeX
    @inproceedings{Qadir2012,
     author = {Qadir, Ghulam and Yahaya, Syamsul and Ho, Anthony T S},
     title = {Surrey University Library for Forensic Analysis (SULFA) of video content},
     booktitle = {Proc. IET Conf. Image Processing (IPR 2012)},
     year = {2012},
     pages = {1--6}}
    
  128. R. Qian, W. Li, N. Yu & Z. Hao
    Image Forensics with Rotation-Tolerant Resampling Detection
    Proc. IEEE Int Multimedia and Expo Workshops (ICMEW) Conf
    2012, pp. 61-66
    BibTeX
    @inproceedings{Qian2012,
     author = {Qian, Ruohan and Li, Weihai and Yu, Nenghai and Hao, Zhuo},
     title = {Image Forensics with Rotation-Tolerant Resampling Detection},
     booktitle = {Proc. IEEE Int Multimedia and Expo Workshops (ICMEW) Conf},
     year = {2012},
     pages = {61--66}}
    
  129. Z. Qian & X. Zhang
    Combating Anti-forensics of Jpeg Compression
    IJCSI International Journal of Computer Science Issues, 2012, Vol. 9(3), pp. 454-459
    BibTeX
    @article{Qian2012a,
     author = {Zhenxing Qian and Xinpeng Zhang},
     title = {Combating Anti-forensics of Jpeg Compression},
     journal = {IJCSI International Journal of Computer Science Issues},
     year = {2012},
     volume = {9},
     number = {3},
     pages = {454--459}}
    
  130. Z. Qu, W. Luo & J. Huang
    Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics
    Hu, S.-M. & Martin, R. (ed.)
    Computational Visual Media
    Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2012, Vol. 7633, pp. 1-8
    BibTeX
    @incollection{Qu2012,
     author = {Qu, Zhenhua and Luo, Weiqi and Huang, Jiwu},
     title = {Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics},
     booktitle = {Computational Visual Media},
     journal = {Lecture Notes in Computer Science},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {7633},
     pages = {1-8}}
    
  131. X. Quan & H. Zhang
    Copy-move forgery detection in digital images based on local dimension estimation
    Proc. Int Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) Conf
    2012, pp. 180-185
    BibTeX
    @inproceedings{Quan2012,
     author = {Xiaomei Quan and Hongbin Zhang},
     title = {Copy-move forgery detection in digital images based on local dimension estimation},
     booktitle = {Proc. Int Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) Conf},
     year = {2012},
     pages = {180--185}}
    
  132. Y. Roodt, W. Clarke, P. Robinson & A. Nel
    Robust single image noise estimation from approximate local statistics
    2012
    BibTeX
    @article{Roodt2012,
     author = {Roodt, Y. and Clarke, W. and Robinson, P.E. and Nel, A.},
     title = {Robust single image noise estimation from approximate local statistics},
     year = {2012}}
    
  133. M. Rosenfeld, R. Creutzburg & C. Vielhauer
    Kamera-Sensorforensik: Erkennungsraten im Kontext von Bildkompression
    Heinrich C. Mayr, Alpen-Adria-Universität Klagenfurt, A. (C. D. F. T. U. D. G. U. F. H. f. T. S. U. F. U. D.-E. G. J.-C. F. H.-U. z. B. G. M. G. U. D.-E. G. R. H. U. B. G. M. K. U. d. B. M. G. A. L. U. d. B. M. G. E. W. M. T. U. M. G. S. S. U. S. G. I. T. U. T. K. V. H. B. G. M. W. U. K.-L. G. (ed.)
    Lecture Notes in Informatics
    Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg, Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg, 2012, Vol. P-194(2012), pp. 117
    BibTeX
    @inproceedings{Rosenfeld,
     author = {Rosenfeld, M. and Creutzburg, R. and Vielhauer, C.},
     title = {Kamera-Sensorforensik: Erkennungsraten im Kontext von Bildkompression},
     booktitle = {Lecture Notes in Informatics},
     school = {Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg},
     year = {2012},
     volume = {P-194(2012)},
     pages = {117}}
    
  134. R.M.S. Ruth, L. Vanitha & F.F. Gnanaraj
    Forgery detection in digital images using Self Organizing Map
    Proc. Int Devices, Circuits and Systems (ICDCS) Conf
    2012, pp. 699-703
    BibTeX
    @inproceedings{Ruth2012,
     author = {Ruth, R. M. S. and Vanitha, L. and Gnanaraj, F. F. },
     title = {Forgery detection in digital images using Self Organizing Map},
     booktitle = {Proc. Int Devices, Circuits and Systems (ICDCS) Conf},
     year = {2012},
     pages = {699--703}}
    
  135. S.Manimurugan & B. Jose
    A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix
    International Journal of Engineering Trends and Technology, 2012, Vol. 3(2), pp. 94-97
    BibTeX
    @article{Manimurugan2012,
     author = {S.Manimurugan and Boby Jose},
     title = {A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix},
     journal = {International Journal of Engineering Trends and Technology},
     year = {2012},
     volume = {3},
     number = {2},
     pages = {94-97}}
    
  136. C. Schneider, W. Rasband & K. Eliceiri
    NIH Image to ImageJ: 25 years of image analysis
    Nature Methods, Nature Publishing Group, 2012, Vol. 9(7), pp. 671-675
    BibTeX
    @article{Schneider2012,
     author = {Schneider, C.A. and Rasband, W.S. and Eliceiri, K.W.},
     title = {NIH Image to ImageJ: 25 years of image analysis},
     journal = {Nature Methods},
     publisher = {Nature Publishing Group},
     year = {2012},
     volume = {9},
     number = {7},
     pages = {671--675}}
    
  137. M. Schöberl
    Microelectronic Systems: Circuits, Systems and Applications
    Heppner, J., Heuberger, A., Kirsch, K., Elst, G. & Hanke, R. (ed.)
    Chapter Analysis of Processing Pipelines in Digital Raw Cameras
    Springer, 2012, pp. 281
    BibTeX
    @inbook{Schoeberl2012,
     author = {Michael Schöberl},
     title = {Microelectronic Systems: Circuits, Systems and Applications},
     publisher = {Springer},
     year = {2012},
     pages = {281}}
    
  138. H. Shao, T. Yu, M. Xu & W. Cui
    Image region duplication detection based on circular window expansion and phase correlation
    Forensic Science International, 2012, Vol. 04, pp. -
    BibTeX
    @article{Shao2012,
     author = {Hong Shao and Tianshu Yu and Mengjia Xu and Wencheng Cui},
     title = {Image region duplication detection based on circular window expansion and phase correlation},
     journal = {Forensic Science International},
     year = {2012},
     volume = {04},
     pages = {-}}
    
  139. W. Shen & N. Xiamu
    A Countermeasure against Double Compression Based Image Forensic
    IEICE TRANSACTIONS on Information and Systems, The Institute of Electronics, Information and Communication Engineers, 2012, Vol. 95(10), pp. 2577-2580
    BibTeX
    @article{Shen2012,
     author = {Shen, W. and Xiamu, NIU},
     title = {A Countermeasure against Double Compression Based Image Forensic},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     publisher = {The Institute of Electronics, Information and Communication Engineers},
     year = {2012},
     volume = {95},
     number = {10},
     pages = {2577--2580}}
    
  140. F. Shi, B. Kang, H. Li & Y. Zhu
    A new method for detecting JEPG doubly compression images by using estimated primary quantization step
    Proc. Int Systems and Informatics (ICSAI) Conf
    2012, pp. 1810-1814
    BibTeX
    @inproceedings{Shi2012,
     author = {FangLing Shi and BaoSheng Kang and HongAn Li and Yu Zhu},
     title = {A new method for detecting JEPG doubly compression images by using estimated primary quantization step},
     booktitle = {Proc. Int Systems and Informatics (ICSAI) Conf},
     year = {2012},
     pages = {1810--1814}}
    
  141. J.Y. Shim & S.-W. Kim
    Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter
    J. (Jong Hyuk) Park, J. J. (J. H., Chao, H.-C., S. Obaidat, M. S. & Kim, J. (ed.)
    Computer Science and Convergence
    Springer Netherlands, 2012, Vol. 114, pp. 713-721
    BibTeX
    @incollection{Shim2012,
     author = {Shim, Jae Youn and Kim, Seong-Whan},
     title = {Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter},
     booktitle = {Computer Science and Convergence},
     publisher = {Springer Netherlands},
     year = {2012},
     volume = {114},
     pages = {713-721}}
    
  142. Y.-D. Shin
    Fast Detection of Copy-Move Forgery Image Using Three Step Search Algorithm in the Spatial Domain
    Lee, G., Howard, D., Kang, J. & Slezak, D. (ed.)
    Convergence and Hybrid Information Technology
    Springer Berlin / Heidelberg, 2012, Vol. 7425, pp. 389-395
    BibTeX
    @incollection{Shin2012,
     author = {Shin, Yong-Dal},
     title = {Fast Detection of Copy-Move Forgery Image Using Three Step Search Algorithm in the Spatial Domain},
     booktitle = {Convergence and Hybrid Information Technology},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7425},
     pages = {389-395}}
    
  143. Y. Shuang & F. Zhen
    Primary Quality Factor Estimation in Double Compressed JPEG Images Using Quantization Error
    Zhang, W., Yang, X., Xu, Z., An, P., Liu, Q. & Lu, Y. (ed.)
    Advances on Digital Television and Wireless Multimedia Communications
    Springer Berlin Heidelberg, 2012, Vol. 331, pp. 133-139
    BibTeX
    @incollection{Shuang2012,
     author = {Shuang, Yang and Zhen, Fang},
     title = {Primary Quality Factor Estimation in Double Compressed JPEG Images Using Quantization Error},
     booktitle = {Advances on Digital Television and Wireless Multimedia Communications},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {331},
     pages = {133-139}}
    
  144. J. Singh & B. Raman
    A High Performance Copy-Move Image Forgery Detection Scheme on GPU
    Deep, K., Nagar, A., Pant, M. & Bansal, J. C. (ed.)
    Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011
    Springer Berlin / Heidelberg, 2012, Vol. 131, pp. 239-246
    BibTeX
    @incollection{Singh2012,
     author = {Singh, Jaideep and Raman, Balasubramanian},
     title = {A High Performance Copy-Move Image Forgery Detection Scheme on GPU},
     booktitle = {Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {131},
     pages = {239-246}}
    
  145. M. Sridevi, C. Mala & S. Sandeep
    Copy -- Move Image Forgery Detection an a Parallel Environment
    Computer Science & Information Technology, 2012, Vol. 2, pp. 19-29
    BibTeX
    @article{Sridevi2012a,
     author = {M. Sridevi and C. Mala and S. Sandeep},
     title = {Copy -- Move Image Forgery Detection an a Parallel Environment},
     journal = {Computer Science & Information Technology},
     year = {2012},
     volume = {2},
     pages = {19-29}}
    
  146. M. Sridevi, C. Mala & S. Sanyam
    Comparative Study of Image Forgery and Copy-Move Techniques
    Wyld, D. C., Zizka, J. & Nagamalai, D. (ed.)
    Advances in Computer Science, Engineering & Applications
    Springer Berlin / Heidelberg, 2012, Vol. 166, pp. 715-723
    BibTeX
    @incollection{Sridevi2012,
     author = {Sridevi, M. and Mala, C. and Sanyam, Siddhant},
     title = {Comparative Study of Image Forgery and Copy-Move Techniques},
     booktitle = {Advances in Computer Science, Engineering & Applications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {166},
     pages = {715-723}}
    
  147. M.C. Stamm, W.S. Lin & K.J.R. Liu
    Temporal Forensics and Anti-Forensics for Motion Compensated Video
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1315-1329
    BibTeX
    @article{Stamm2012,
     author = {Stamm, M. C. and Lin, W. S. and Liu, K. J. R. },
     title = {Temporal Forensics and Anti-Forensics for Motion Compensated Video},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {4},
     pages = {1315--1329}}
    
  148. M.C. Stamm, W.S. Lin & K.J.R. Liu
    Forensics vs. anti-forensics: A decision and game theoretic framework
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1749-1752
    BibTeX
    @inproceedings{Stamm2012a,
     author = {Stamm, Matthew C. and Lin, W. Sabrina and Liu, K. J. Ray},
     title = {Forensics vs. anti-forensics: A decision and game theoretic framework},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1749--1752}}
    
  149. T. Sun, W. Wang & X. Jiang
    Exposing video forgeries by detecting MPEG double compression
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1389-1392
    BibTeX
    @inproceedings{Sun2012,
     author = {Tanfeng Sun and Wan Wang and Xinghao Jiang},
     title = {Exposing video forgeries by detecting MPEG double compression},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1389--1392}}
    
  150. P. Sutthiwan
    Image Statistical Frameworks For Digital Image Forensics
    New Jersey Institute of Technology - Department of Electrical and Computer Engineering, New Jersey Institute of Technology - Department of Electrical and Computer Engineering, 2012
    BibTeX
    @phdthesis{Sutthiwan2012a,
     author = {Patchara Sutthiwan},
     title = {Image Statistical Frameworks For Digital Image Forensics},
     school = {New Jersey Institute of Technology - Department of Electrical and Computer Engineering},
     year = {2012}}
    
  151. P. Sutthiwan & Y. Shi
    Anti-Forensics of Double JPEG Compression Detection
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 411-424
    BibTeX
    @incollection{Sutthiwan2012,
     author = {Sutthiwan, Patchara and Shi, Yun},
     title = {Anti-Forensics of Double JPEG Compression Detection},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {411-424}}
    
  152. W. Taktak & J.-L. Dugelay
    The Era of Interactive Media
    Xu, M. & Jin, J. S. (ed.)
    Chapter Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
    The Era of Interactive Media, Springer, 2012, pp. 37
    BibTeX
    @inbook{Taktak2012,
     author = {Taktak, Wiem and Dugelay, Jean-Luc},
     title = {The Era of Interactive Media},
     journal = {The Era of Interactive Media},
     publisher = {Springer},
     year = {2012},
     pages = {37}}
    
  153. G. Talmale & R. Jasutkar
    Analysis Of Different Techniques Of Image Forgery Detection
    International Journal of Computer Applications (IJCA), 2012, Vol. 7-8, pp. 13-18
    BibTeX
    @article{Talmale2012,
     author = {G.R. Talmale and R.W. Jasutkar},
     title = {Analysis Of Different Techniques Of Image Forgery Detection},
     journal = {International Journal of Computer Applications (IJCA)},
     year = {2012},
     volume = {7-8},
     pages = {13-18}}
    
  154. C. Tang, X. Yang & G. Zhai
    Dual-Transform Based Noise Estimation
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2012, pp. 991-996
    BibTeX
    @inproceedings{Tang2012,
     author = {Chongwu Tang and Xiaokang Yang and Guangtao Zhai},
     title = {Dual-Transform Based Noise Estimation},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2012},
     pages = {991--996}}
    
  155. T.H. Thai, R. Cogranne & F. Retraint
    Camera Model Identification Based on Hypothesis Testing Theory
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012, pp. 1234-1238
    BibTeX
    @inproceedings{Thai2012,
     author = {T. H. Thai and R. Cogranne and F. Retraint},
     title = {Camera Model Identification Based on Hypothesis Testing Theory},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012},
     pages = {1234-1238}}
    
  156. V.L.L. Thing, Y. Chen & C. Cheh
    An Improved Double Compression Detection Method for JPEG Image Forensics
    Proc. IEEE Int Multimedia (ISM) Symp
    2012, pp. 290-297
    BibTeX
    @inproceedings{Thing2012,
     author = {Thing, Vrizlynn L. L. and Chen, Yu and Cheh, Carmen},
     title = {An Improved Double Compression Detection Method for JPEG Image Forensics},
     booktitle = {Proc. IEEE Int Multimedia (ISM) Symp},
     year = {2012},
     pages = {290--297}}
    
  157. J. Tian & L. Chen
    Image Noise Estimation Using A Variation-Adaptive Evolutionary Approach
    IEEE Signal Processing Letters, 2012, Vol. 19(7), pp. 395-398
    BibTeX
    @article{Tian2012,
     author = {Tian, J. and Chen, L. },
     title = {Image Noise Estimation Using A Variation-Adaptive Evolutionary Approach},
     journal = {IEEE Signal Processing Letters},
     year = {2012},
     volume = {19},
     number = {7},
     pages = {395--398}}
    
  158. D. Tralic, J. Petrovic & S. Grgic
    JPEG image tampering detection using blocking artifacts
    Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf
    2012, pp. 5-8
    BibTeX
    @inproceedings{Tralic2012,
     author = {Tralic, Dijana and Petrovic, Juraj and Grgic, Sonja},
     title = {JPEG image tampering detection using blocking artifacts},
     booktitle = {Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2012},
     pages = {5--8}}
    
  159. M.-J. Tsai, C.-S. Wang, J. Liu & J.-S. Yin
    Using decision fusion of feature selection in digital forensics for camera source model identification
    Comput. Stand. Interfaces, Elsevier Science Publishers B. V., 2012, Vol. 34(3), pp. 292-304
    BibTeX
    @article{Tsai2012,
     author = {Tsai, Min-Jen and Wang, Chen-Sheng and Liu, Jung and Yin, Jin-Sheng},
     title = {Using decision fusion of feature selection in digital forensics for camera source model identification},
     journal = {Comput. Stand. Interfaces},
     publisher = {Elsevier Science Publishers B. V.},
     year = {2012},
     volume = {34},
     number = {3},
     pages = {292--304}}
    
  160. A. Uhl & Y. Holler
    Iris-sensor authentication using camera PRNU fingerprints
    Proc. 5th IAPR Int Biometrics (ICB) Conf
    2012, pp. 230-237
    BibTeX
    @inproceedings{Uhl2012,
     author = {Uhl, A. and Holler, Y. },
     title = {Iris-sensor authentication using camera PRNU fingerprints},
     booktitle = {Proc. 5th IAPR Int Biometrics (ICB) Conf},
     year = {2012},
     pages = {230--237}}
    
  161. K.V.Hulmukhe, S.S.Sane & A.A. Borse
    Exploring Duplicated Regions in Natural Images
    IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012), 2012, Vol. iccia(3), pp. -
    BibTeX
    @article{V.Hulmukhe2012,
     author = {Kavita V.Hulmukhe and S.S.Sane and Alpana A. Borse},
     title = {Exploring Duplicated Regions in Natural Images},
     journal = {IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012)},
     year = {2012},
     volume = {iccia},
     number = {3},
     pages = {-}}
    
  162. E.E. Varsaki, V. Fotopoulos & A.N. Skodras
    Pascal transform based self-authentication of color images
    Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf
    2012, pp. 168-171
    BibTeX
    @inproceedings{Varsaki2012,
     author = {Varsaki, E. E. and Fotopoulos, V. and Skodras, A. N. },
     title = {Pascal transform based self-authentication of color images},
     booktitle = {Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2012},
     pages = {168--171}}
    
  163. D. Vazquez-Padin, M. Fontani, T. Bianchi, P. Comesana, A. Piva & M. Barni
    Detection of video double encoding with GOP size estimation
    Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
    2012, pp. 151-156
    BibTeX
    @inproceedings{Vazquez-Padin2012a,
     author = {Vazquez-Padin, D. and Fontani, M. and Bianchi, T. and Comesana, P. and Piva, A. and Barni, M.},
     title = {Detection of video double encoding with GOP size estimation},
     booktitle = {Information Forensics and Security (WIFS), 2012 IEEE International Workshop on},
     year = {2012},
     pages = {151--156}}
    
  164. D. Vázquez-Padín & F. Pérez-González
    Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 306-320
    BibTeX
    @incollection{Vazquez-Padin2012,
     author = {Vázquez-Padín, David and Pérez-González, Fernando},
     title = {Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces},
     booktitle = {Digital Forensics and Watermarking},
     journal = {Lecture Notes in Computer Science},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {306-320}}
    
  165. J. Voisin, C. Guyeux & J.M. Bahi
    The Metadata Anonymization Toolkit
    arXiv preprint arXiv:1212.3648, 2012
    BibTeX
    @article{Voisin2012,
     author = {Voisin, Julien and Guyeux, Christophe and Bahi, Jacques M},
     title = {The Metadata Anonymization Toolkit},
     journal = {arXiv preprint arXiv:1212.3648},
     year = {2012}}
    
  166. A.W.A. Wahab, A.T. Ho & S. Li
    Inter-Camera Model Image Source Identification with Conditional Probability Features
    Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop 2012
    2012
    BibTeX
    @inproceedings{Wahab2012,
     author = {Ainuddin Wahid Abdul Wahab and Anthony T.S. Ho and Shujun Li},
     title = {Inter-Camera Model Image Source Identification with Conditional Probability Features},
     booktitle = {Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop 2012},
     year = {2012}}
    
  167. B. Wang & X. Kong
    Image Splicing Localization Based on Re-demosaicing
    Zeng, D. (ed.)
    Advances in Information Technology and Industry Applications
    Springer Berlin Heidelberg, 2012, Vol. 136, pp. 725-732
    BibTeX
    @incollection{Wang2012,
     author = {Wang, Bo and Kong, Xiangwei},
     title = {Image Splicing Localization Based on Re-demosaicing},
     booktitle = {Advances in Information Technology and Industry Applications},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {136},
     pages = {725-732}}
    
  168. S. Wang & X. Niu
    Hiding traces of double compression in JPEG images based on Tabu Search
    Neural Computing & Applications, Springer London, 2012, Vol. -, pp. 1-9
    BibTeX
    @article{Wang2012a,
     author = {Wang, Shen and Niu, Xiamu},
     title = {Hiding traces of double compression in JPEG images based on Tabu Search},
     journal = {Neural Computing & Applications},
     publisher = {Springer London},
     year = {2012},
     volume = {-},
     pages = {1-9}}
    
  169. T. Wang, J. Tang, W. Zhao, Q. Xu & B. Luo
    Blind Detection of Copy-Move Forgery Based on Multi-Scale Autoconvolution Invariants
    Liu, C.-L., Zhang, C. & Wang, L. (ed.)
    Pattern Recognition
    Springer Berlin Heidelberg, 2012, Vol. 321, pp. 438-446
    BibTeX
    @incollection{Wang2012c,
     author = {Wang, Tao and Tang, Jin and Zhao, Wei and Xu, Qin and Luo, Bin},
     title = {Blind Detection of Copy-Move Forgery Based on Multi-Scale Autoconvolution Invariants},
     booktitle = {Pattern Recognition},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {321},
     pages = {438-446}}
    
  170. X. Wang, J. Xue, Z. Zheng, Z. Liu & N. Li
    Image forensic signature for content authenticity analysis
    Journal of Visual Communication and Image Representation, 2012, Vol. 23(5), pp. 782 - 797
    BibTeX
    @article{Wang2012d,
     author = {Xiaofeng Wang and Jianru Xue and Zhenqiang Zheng and Zhenli Liu and Ning Li},
     title = {Image forensic signature for content authenticity analysis},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2012},
     volume = {23},
     number = {5},
     pages = {782 - 797}}
    
  171. Y. Wang, K. Gurule, J. Wise & J. Zheng
    Wavelet Based Region Duplication Forgery Detection
    Proc. Ninth Int Information Technology: New Generations (ITNG) Conf
    2012, pp. 30-35
    BibTeX
    @inproceedings{Wang2012b,
     author = {Wang, Yang and Gurule, Kaitlyn and Wise, Jacqueline and Zheng, Jun},
     title = {Wavelet Based Region Duplication Forgery Detection},
     booktitle = {Proc. Ninth Int Information Technology: New Generations (ITNG) Conf},
     year = {2012},
     pages = {30--35}}
    
  172. A.D. Warbhe & R.V. Dharaskar
    Article: Blind Method for Image Forgery Detection: A tool for Digital Image Forensics
    IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012), 2012, Vol. ncipet(11), pp. 37-40
    BibTeX
    @article{Warbhe2012,
     author = {Anil Dada Warbhe and R. V. Dharaskar},
     title = {Article: Blind Method for Image Forgery Detection: A tool for Digital Image Forensics},
     journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)},
     year = {2012},
     volume = {ncipet},
     number = {11},
     pages = {37-40}}
    
  173. L.X. Wei, J.J. Zhu & X.Y. Yang
    An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points
    Advanced Materials Research, 2012, Vol. Volumes 341 - 342 Material and Manufacturing Technology II, pp. 743-747
    BibTeX
    @article{Wei2012,
     author = {Li Xian Wei and Jun Jie Zhu and Xiao Yuan Yang},
     title = {An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points},
     journal = {Advanced Materials Research},
     year = {2012},
     volume = {Volumes 341 - 342 Material and Manufacturing Technology II},
     pages = {743-747}}
    
  174. W. Wei & W.R. ding
    The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients
    Energy Procedia, 2012, Vol. 17, Part A(0), pp. 623 - 629
    BibTeX
    @article{Wei2012a,
     author = {Wang Wei and WANG Rang-ding},
     title = {The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients},
     journal = {Energy Procedia},
     year = {2012},
     volume = {17, Part A},
     number = {0},
     pages = {623 - 629}}
    
  175. G. Wu, X.K. & K.J.R. Liu
    A Context Adaptive Predictor of Sensor Pattern Noise for Camera Source Identification
    School of Information Science and Technology, School of Information Science and Technology, 2012
    BibTeX
    @techreport{Wu2012a,
     author = {Guangdong Wu and , Xiangui Kang and and K. J. Ray Liu},
     title = {A Context Adaptive Predictor of Sensor Pattern Noise for Camera Source Identification},
     school = {School of Information Science and Technology},
     year = {2012}}
    
  176. L. Wu, X. Cao, W. Zhang & Y. Wang
    Detecting image forgeries using metrology
    Machine Vision and Applications, Springer Berlin / Heidelberg, 2012, Vol. 23, pp. 363-373
    BibTeX
    @article{Wu2012,
     author = {Wu, Lin and Cao, Xiaochun and Zhang, Wei and Wang, Yang},
     title = {Detecting image forgeries using metrology},
     journal = {Machine Vision and Applications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {23},
     pages = {363-373}}
    
  177. Y. Wu, Lin Wang
    Detecting image forgeries using geometric cues
    arXiv, Springer Berlin / Heidelberg, 2012
    BibTeX
    @article{Wu2012b,
     author = {Wu, Lin Wang, Yang},
     title = {Detecting image forgeries using geometric cues},
     journal = {arXiv},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012}}
    
  178. B. Xu, G. Liu & Y. Dai
    A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation
    Proc. Fourth Int Multimedia Information Networking and Security (MINES) Conf
    2012, pp. 319-322
    BibTeX
    @inproceedings{Xu2012a,
     author = {Xu, Bo and Liu, Guangjie and Dai, Yuewei},
     title = {A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation},
     booktitle = {Proc. Fourth Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2012},
     pages = {319--322}}
    
  179. G. Xu & Y.Q. Shi
    Camera Model Identification Using Local Binary Patterns
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2012, pp. 392-397
    BibTeX
    @inproceedings{Xu2012,
     author = {Guanshuo Xu and Yun Qing Shi},
     title = {Camera Model Identification Using Local Binary Patterns},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2012},
     pages = {392--397}}
    
  180. J. Xu, Y. Yu, Y. Su, B. Dong & X. You
    Detection of Blue Screen Special Effects in Videos
    Physics Procedia, 2012, Vol. 33(0), pp. 1316 - 1322
    BibTeX
    @article{Xu2012b,
     author = {Junyu Xu and Yanru Yu and Yuting Su and Bo Dong and Xingang You},
     title = {Detection of Blue Screen Special Effects in Videos},
     journal = {Physics Procedia},
     year = {2012},
     volume = {33},
     number = {0},
     pages = {1316 - 1322}}
    
  181. P. Yadav & Y. Rathore
    Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
    International Journal on Computer Science and Engineering (IJCSE), 2012, Vol. 4, pp. 265-270
    BibTeX
    @article{Yadav2012,
     author = {Preeti Yadav and Yogesh Rathore},
     title = {Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform},
     journal = {International Journal on Computer Science and Engineering (IJCSE)},
     year = {2012},
     volume = {4},
     pages = {265-270}}
    
  182. P. Yadav, Y. Rathore & A. Yadu
    DWT Based Copy-Move Image Forgery Detection
    International Journal of Advanced Research in Computer Science and Electroic Engineering, 2012, Vol. 1(5)
    BibTeX
    @article{Yadav2012a,
     author = {Preeti Yadav and Yogesh Rathore and Aarti Yadu},
     title = {DWT Based Copy-Move Image Forgery Detection},
     journal = {International Journal of Advanced Research in Computer Science and Electroic Engineering},
     year = {2012},
     volume = {1},
     number = {5}}
    
  183. S. Yahaya, A.T.S. Ho & A.A. Wahab
    Advanced video camera identification using Conditional Probability Features
    Proc. IET Conf. Image Processing (IPR 2012)
    2012, pp. 1-5
    BibTeX
    @inproceedings{Yahaya2012,
     author = {Yahaya, Syamsul and Ho, Anthony T S and Wahab, Ainuddin Abdul},
     title = {Advanced video camera identification using Conditional Probability Features},
     booktitle = {Proc. IET Conf. Image Processing (IPR 2012)},
     year = {2012},
     pages = {1--5}}
    
  184. Z.-C. Yang & Z.-H. Li
    An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images
    Proc. Int Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM) Conf
    2012, pp. 93-97
    BibTeX
    @inproceedings{Yang2012,
     author = {Zheng-Chao Yang and Zhao-Hong Li},
     title = {An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images},
     booktitle = {Proc. Int Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM) Conf},
     year = {2012},
     pages = {93--97}}
    
  185. H. Yao, S. Wang, Y. Zhao & X. Zhang
    Detecting Image Forgery Using Perspective Constraints
    IEEE Signal Processing Letters, 2012, Vol. 19(3), pp. 123-126
    BibTeX
    @article{Yao2012,
     author = {Yao, H. and Wang, S. and Zhao, Y. and Zhang, X.},
     title = {Detecting Image Forgery Using Perspective Constraints},
     journal = {IEEE Signal Processing Letters},
     year = {2012},
     volume = {19},
     number = {3},
     pages = {123--126}}
    
  186. M. Ye, Y. Yang, W. Duan & M. Yang
    Measure and redress of mode field diameter of polarization maintaining photonic crystal fibers
    Instrumentation and Control Technology (ISICT), 2012 8th IEEE International Symposium on
    2012, pp. 101-104
    BibTeX
    @inproceedings{Ye2012,
     author = {Miao Ye and Yuanhong Yang and Weiqian Duan and Mingwei Yang},
     title = {Measure and redress of mode field diameter of polarization maintaining photonic crystal fibers},
     booktitle = {Instrumentation and Control Technology (ISICT), 2012 8th IEEE International Symposium on},
     year = {2012},
     pages = {101--104}}
    
  187. L. Yong, H. Meishan & L. Bogang
    Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition
    Chim, T. & Yuen, T. (ed.)
    Information and Communications Security
    Springer Berlin Heidelberg, 2012, Vol. 7618, pp. 357-364
    BibTeX
    @incollection{Yong2012,
     author = {Yong, Liu and Meishan, Huang and Bogang, Lin},
     title = {Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition},
     booktitle = {Information and Communications Security},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {7618},
     pages = {357-364}}
    
  188. F. Zach, C. Riess & E. Angelopoulou
    Automated Image Forgery Detection through Classification of JPEG Ghosts
    Pinz, A., Pock, T., Bischof, H. & Leberl, F. (ed.)
    Pattern Recognition
    Springer Berlin / Heidelberg, 2012, Vol. 7476, pp. 185-194
    BibTeX
    @incollection{Zach2012,
     author = {Zach, Fabian and Riess, Christian and Angelopoulou, Elli},
     title = {Automated Image Forgery Detection through Classification of JPEG Ghosts},
     booktitle = {Pattern Recognition},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7476},
     pages = {185-194}}
    
  189. D. Zhang
    The Utility of Inconsistency in Information Security and Digital Forensics
    Özyer, T., Kianmehr, K. & Tan, M. (ed.)
    Recent Trends in Information Reuse and Integration
    Springer Vienna, 2012, Vol. -, pp. 381-397
    BibTeX
    @incollection{Zhang2012,
     author = {Zhang, Du},
     title = {The Utility of Inconsistency in Information Security and Digital Forensics},
     booktitle = {Recent Trends in Information Reuse and Integration},
     publisher = {Springer Vienna},
     year = {2012},
     volume = {-},
     pages = {381-397}}
    
  190. Y. Zhang, C. Zhao, Y. Pi & S. Li
    Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients
    Liang, Q., Wang, W., Mu, J., Liang, J., Zhang, B., Pi, Y. & Zhao, C. (ed.)
    Communications, Signal Processing, and Systems
    Springer New York, 2012, Vol. 202, pp. 181-189
    BibTeX
    @incollection{Zhang2012a,
     author = {Zhang, Yujin and Zhao, Chenglin and Pi, Yiming and Li, Shenghong},
     title = {Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients},
     booktitle = {Communications, Signal Processing, and Systems},
     publisher = {Springer New York},
     year = {2012},
     volume = {202},
     pages = {181-189}}
    
  191. X. Zhao, S. Wang, S. Li & J. Li
    A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 243-256
    BibTeX
    @incollection{Zhao2012,
     author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua},
     title = {A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {243-256}}
    
  192. W.D. Zhong, J.J. Zhu, L.X. Wei & X.Y. Yang
    A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency
    Zhang, C. S. (ed.)
    Materials Science and Information Technology
    2012, pp. 5463-5468
    BibTeX
    @inproceedings{Zhong2012,
     author = {Wei Dong Zhong and Jun Jie Zhu and Li Xian Wei and Xiao Yuan Yang},
     title = {A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency},
     booktitle = {Materials Science and Information Technology},
     year = {2012},
     pages = {5463-5468}}
    
  193. L.-n. Zhou, Y.-b. Guo & X.-g. You
    Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 257-267
    BibTeX
    @incollection{Zhou2012,
     author = {Zhou, Lin-na and Guo, Yun-biao and You, Xin-gang},
     title = {Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {257-267}}
    
  194. Z. Zhou & C. Zhou
    Digital Image Identification Based on Asymmetrical Distribution
    Journal of Information & Computational Science, 2012, Vol. 9(5), pp. 1337-1342
    BibTeX
    @article{Zhou2012a,
     author = {Zhou, Z. and Zhou, C.},
     title = {Digital Image Identification Based on Asymmetrical Distribution},
     journal = {Journal of Information & Computational Science},
     year = {2012},
     volume = {9},
     number = {5},
     pages = {1337--1342}}
    
  195. J.Y. Zhu, M.Y. Chen & F. Li
    Image Detection Based-on the Analysis of Interpolating Signal Periodicity
    Advanced Materials Research, 2012, Vol. 403-408, pp. 1297-1301
    BibTeX
    @article{Zhu2012,
     author = {Jue Yu Zhu and Meng Yuan Chen and Feng Li},
     title = {Image Detection Based-on the Analysis of Interpolating Signal Periodicity},
     journal = {Advanced Materials Research},
     year = {2012},
     volume = {403-408},
     pages = {1297-1301}}
    


2011

  1. S. Abramov, V. Zabrodina, V. Lukin, B. Vozel, K. Chehdi & J. Astola
    Numerical Analysis - Theory and Application
    Awrejcewicz, J. (ed.)
    Chapter Methods for Blind Estimation of the Variance of Mixed Noise and Their Performance Analysis
    InTech, 2011, pp. 49-70
    BibTeX
    @inbook{Abramov2011,
     author = {Sergey Abramov and Victoria Zabrodina and Vladimir Lukin and Benoit Vozel and Kacem Chehdi and Jaakko Astola},
     title = {Numerical Analysis - Theory and Application},
     publisher = {InTech},
     year = {2011},
     pages = {49-70}}
    
  2. I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, L.D. Tongo & G. Serra
    An image forensics tool for copy-move detection and localization
    Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Luca Del Tongo, Giuseppe Serra, 2011
    BibTeX
    @techreport{Amerini2011a,
     author = {Irene Amerini and Lamberto Ballan and Roberto Caldelli and Alberto Del Bimbo and Luca Del Tongo and Giuseppe Serra},
     title = {An image forensics tool for copy-move detection and localization},
     year = {2011}}
    
  3. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo & G. Serra
    A SIFT-based forensic method for copy-move attack detection and transformation recovery
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1099 - 1110
    BibTeX
    @article{Amerini2011,
     author = {Amerini, I. and Ballan, L. and Caldelli, R. and Del Bimbo, A. and Serra, G.},
     title = {A SIFT-based forensic method for copy-move attack detection and transformation recovery},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {3},
     pages = {1099 - 1110}}
    
  4. U. Ananya & U. Mudenagudi
    Detection of doctored images using bispectral analysis
    Proc. Int Image Information Processing (ICIIP) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Ananya2011,
     author = {Ananya, U. and Mudenagudi, U.},
     title = {Detection of doctored images using bispectral analysis},
     booktitle = {Proc. Int Image Information Processing (ICIIP) Conf},
     year = {2011},
     pages = {1--6}}
    
  5. S.D. Anderson
    Digital Image Analysis: Analytical Framework For Authenticating Digital Images
    University of Colorado Denver, 2011
    BibTeX
    @mastersthesis{Anderson2011,
     author = {Anderson, Scott Dale},
     title = {Digital Image Analysis: Analytical Framework For Authenticating Digital Images},
     school = {University of Colorado Denver},
     year = {2011}}
    
  6. S. Battiato, G.M. Farinella, E. Messina & G. Puglisi
    Robust Image Registration and Tampering Localization Exploiting Bag of Features Based Forensic Signature
    Proceedings of the 19th ACM international conference on Multimedia
    ACM, 2011, pp. 1245-1248
    BibTeX
    @inproceedings{Battiato2011,
     author = {Sebastiano Battiato and Giovanni Maria Farinella and Enrico Messina and Giovanni Puglisi},
     title = {Robust Image Registration and Tampering Localization Exploiting Bag of Features Based Forensic Signature},
     booktitle = {Proceedings of the 19th ACM international conference on Multimedia},
     publisher = {ACM},
     year = {2011},
     pages = {1245--1248}}
    
  7. S. Battiato, G.M. Farinella, E. Messina & G. Puglisi
    A Forensic Signature Based on Spatial Distributed Bag of Features for Image Alignment and Tampering Detection
    Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
    ACM, 2011, pp. 19-24
    BibTeX
    @inproceedings{Battiato2011a,
     author = {Sebastiano Battiato and Giovanni Maria Farinella and Enrico Messina and Giovanni Puglisi},
     title = {A Forensic Signature Based on Spatial Distributed Bag of Features for Image Alignment and Tampering Detection},
     booktitle = {Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence},
     publisher = {ACM},
     year = {2011},
     pages = {19--24}}
    
  8. S. Battiato, G.M. Farinella, E. Messina & G. Puglisi
    Understanding geometric manipulations of images through bovw-based hashing
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Battiato2011b,
     author = {Battiato, S. and Farinella, G. M. and Messina, E. and Puglisi, G. },
     title = {Understanding geometric manipulations of images through bovw-based hashing},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2011},
     pages = {1--6}}
    
  9. T. Bianchi, A. De Rosa & A. Piva
    Improved DCT coefficient analysis for forgery localization in JPEG images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011, pp. 2444-2447
    BibTeX
    @inproceedings{Bianchi2011,
     author = {Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro},
     title = {Improved DCT coefficient analysis for forgery localization in JPEG images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011},
     pages = {2444--2447}}
    
  10. T. Bianchi & A. Piva
    Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps
    IEEE Transactions on Information Forensics and Security, 2011, Vol. PP(99), pp. 1
    BibTeX
    @article{Bianchi2011a,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  11. T. Bianchi & A. Piva
    Analysis of non-aligned double JPEG artifacts for the localization of image forgeries
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2011, pp. 1-6
    BibTeX
    @inproceedings{Bianchi2011b,
     author = {Bianchi, Tiziano and Piva, Alessandro },
     title = {Analysis of non-aligned double JPEG artifacts for the localization of image forgeries},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2011},
     pages = {1--6}}
    
  12. T. Bianchi & A. Piva
    Detection of non-aligned double JPEG compression with estimation of primary compression parameters
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1929-1932
    BibTeX
    @inproceedings{Bianchi2011d,
     author = {Bianchi, Tiziano and Piva, Alessandro },
     title = {Detection of non-aligned double JPEG compression with estimation of primary compression parameters},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1929--1932}}
    
  13. G. Boracchi & A. Foi
    Uniform Motion Blur in Poissonian Noise: Blur/Noise Tradeoff
    IEEE Transactions on Image Processing, 2011, Vol. 20(2), pp. 592-598
    BibTeX
    @article{Boracchi2011,
     author = {Boracchi, G. and Foi, A.},
     title = {Uniform Motion Blur in Poissonian Noise: Blur/Noise Tradeoff},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {20},
     number = {2},
     pages = {592--598}}
    
  14. S. Bravo-Solorio & A.K. Nandi
    Exposing duplicated regions affected by reflection, rotation and scaling
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011, pp. 1880-1883
    BibTeX
    @inproceedings{Bravo-Solorio2011,
     author = {Bravo-Solorio, Sergio and Nandi, Asoke K.},
     title = {Exposing duplicated regions affected by reflection, rotation and scaling},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011},
     pages = {1880--1883}}
    
  15. S. Bravo-Solorio & A.K. Nandi
    Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
    Signal Processing, 2011, Vol. 91(8), pp. 1759 - 1770
    BibTeX
    @article{Bravo-Solorio2011a,
     author = {Sergio Bravo-Solorio and Asoke K. Nandi},
     title = {Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics},
     journal = {Signal Processing},
     year = {2011},
     volume = {91},
     number = {8},
     pages = {1759 - 1770}}
    
  16. M.G.B.S. Bruna, A.R.
    Crop Detection Through Blocking Artefacts Analysis
    Proc. of the 16th International Conference on Image Analysis and Processing ICIAP 2011
    2011
    BibTeX
    @inproceedings{Bruna2011,
     author = {Bruna, A.R., Messina, G., Battiato, S.},
     title = {Crop Detection Through Blocking Artefacts Analysis},
     booktitle = {Proc. of the 16th International Conference on Image Analysis and Processing ICIAP 2011},
     year = {2011}}
    
  17. K. Cai, X. Lu, J. Song & X. Wang
    Blind Image Tampering Identification Based on Histogram Features
    Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
    2011, pp. 300-303
    BibTeX
    @inproceedings{Cai2011,
     author = {Kaiwei Cai and Xiaoqing Lu and Jianguo Song and Xiao Wang},
     title = {Blind Image Tampering Identification Based on Histogram Features},
     booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2011},
     pages = {300--303}}
    
  18. G. Cao, Y. Zhao & R. Ni
    Forensic identification of resampling operators: A semi non-intrusive approach
    Forensic Science International, 2011, Vol. -(0), pp. -
    BibTeX
    @article{Cao2011b,
     author = {Gang Cao and Yao Zhao and Rongrong Ni},
     title = {Forensic identification of resampling operators: A semi non-intrusive approach},
     journal = {Forensic Science International},
     year = {2011},
     volume = {-},
     number = {0},
     pages = { - }}
    
  19. G. Cao, Y. Zhao, R. Ni & A. Kot
    Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis
    IEEE Signal Processing Letters, 2011, Vol. 18(10), pp. 603-606
    BibTeX
    @article{Cao2011d,
     author = {G. Cao and Y. Zhao and R. Ni and AC Kot},
     title = {Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis},
     journal = {IEEE Signal Processing Letters},
     year = {2011},
     volume = {18},
     number = {10},
     pages = {603--606}}
    
  20. H. Cao & A. Kot
    Detection of Tampering Inconsistencies on Mobile Photos
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 105-119
    BibTeX
    @incollection{Cao2011,
     author = {Cao, Hong and Kot, Alex},
     title = {Detection of Tampering Inconsistencies on Mobile Photos},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {105-119}}
    
  21. H. Cao & A. Kot
    Similar DSLR Processor Identification using Compact Model Templates
    APSIPA ASC, 2011, pp. 5
    BibTeX
    @article{Cao2011c,
     author = {H. Cao and A.C. Kot},
     title = {Similar DSLR Processor Identification using Compact Model Templates},
     journal = {APSIPA ASC},
     year = {2011},
     pages = {5}}
    
  22. Y. Cao, T. Gao, L. Fan & Q. Yang
    A robust detection algorithm for copy-move forgery in digital images
    Forensic Science International, 2011, Vol. In Press, Corrected Proof, pp. -
    BibTeX
    @article{Cao2011a,
     author = {Yanjun Cao and Tiegang Gao and Li Fan and Qunting Yang},
     title = {A robust detection algorithm for copy-move forgery in digital images},
     journal = {Forensic Science International},
     year = {2011},
     volume = {In Press, Corrected Proof},
     pages = { - }}
    
  23. A. Caron & P. Jodoin
    Image Multi-Distortion Estimation
    IEEE Transactions on Image Processing, 2011, Vol. 20 Issue:12, pp. 3442 - 3454
    BibTeX
    @article{Caron2011,
     author = {Caron, A. and Jodoin, P.},
     title = {Image Multi-Distortion Estimation},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {20 Issue:12},
     pages = {3442 - 3454}}
    
  24. A. Castiglione, G. Cattaneo & A. De Santis
    A Forensic Analysis of Images on Online Social Networks
    Proc. Third Int Intelligent Networking and Collaborative Systems (INCoS) Conf
    2011, pp. 679-684
    BibTeX
    @inproceedings{Castiglione2011,
     author = {Castiglione, A. and Cattaneo, G. and De Santis, A. },
     title = {A Forensic Analysis of Images on Online Social Networks},
     booktitle = {Proc. Third Int Intelligent Networking and Collaborative Systems (INCoS) Conf},
     year = {2011},
     pages = {679--684}}
    
  25. P. Chatterjee & P. Milanfar
    Practical Bounds on Image Denoising: From Estimation to Information
    IEEE Transactions on Image Processing, 2011, Vol. 20(5), pp. 1221-1233
    BibTeX
    @article{Chatterjee2011,
     author = {Chatterjee, P. and Milanfar, P. },
     title = {Practical Bounds on Image Denoising: From Estimation to Information},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {20},
     number = {5},
     pages = {1221--1233}}
    
  26. Y. Chen, S. bo Fu, L. fang Fu, Z. yong Li & Y. peng Hu
    Research noise of image acquisition system on CCD
    Proc. Int Electronics and Optoelectronics (ICEOE) Conf
    2011, Vol. 2
    BibTeX
    @inproceedings{Chen2011a,
     author = {Ying Chen and Shao-bo Fu and Lan-fang Fu and Zhi-yong Li and Yun-peng Hu},
     title = {Research noise of image acquisition system on CCD},
     booktitle = {Proc. Int Electronics and Optoelectronics (ICEOE) Conf},
     year = {2011},
     volume = {2}}
    
  27. Y.-C. Chen, Y. Hu & C.-T. Li
    Further studies on forensic features for source camera identification
    Proc. th Int Imaging for Crime Detection and Prevention 2011 (ICDP 2011) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Chen2011b,
     author = {Ying-Chu Chen and Yongjian Hu and Chang-Tsun Li},
     title = {Further studies on forensic features for source camera identification},
     booktitle = {Proc. th Int Imaging for Crime Detection and Prevention 2011 (ICDP 2011) Conf},
     year = {2011},
     pages = {1--6}}
    
  28. Y.-L. Chen & C.-T. Hsu
    Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(2), pp. 396-406
    BibTeX
    @article{Chen2011,
     author = {Yi-Lei Chen and Chiou-Ting Hsu},
     title = {Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {2},
     pages = {396--406}}
    
  29. H. Chennamma, L. Rangarajan & M. Rao
    Efficient Image Matching using Local Invariant Features for Copy Detection
    Li, C.-T. & Ho, T. S. (ed.)
    Chapter cho18
    New Technologies for Digital Crime and Forensics: Devices, Applications, and Software, IGI Global, 2011, pp. 257-276
    BibTeX
    @inbook{Chennamma2011a,
     author = {Chennamma, H.R. and Lalitha Rangarajan and Rao, M.S.},
     title = {Efficient Image Matching using Local Invariant Features for Copy Detection},
     journal = {New Technologies for Digital Crime and Forensics: Devices, Applications, and Software},
     publisher = {IGI Global},
     year = {2011},
     pages = {257-276}}
    
  30. H.R. Chennamma & L. Rangarajan
    Image Splicing Detection Using Inherent Lens Radial Distortion
    IJCSI International Journal of Computer Science Issues, 2011, Vol. 7, pp. 49-158
    BibTeX
    @article{Chennamma2011,
     author = {H. R. Chennamma and Lalitha Rangarajan},
     title = {Image Splicing Detection Using Inherent Lens Radial Distortion},
     journal = {IJCSI International Journal of Computer Science Issues},
     year = {2011},
     volume = {7},
     pages = {49-158}}
    
  31. Z. Chi, Y. Suying & X. Jiangtao
    Noise in a CMOS digital pixel sensor
    Journal of Semiconductors, 2011, Vol. 32(11), pp. 115005
    BibTeX
    @article{Chi2011,
     author = {Zhang Chi and Yao Suying and Xu Jiangtao},
     title = {Noise in a CMOS digital pixel sensor},
     journal = {Journal of Semiconductors},
     year = {2011},
     volume = {32},
     number = {11},
     pages = {115005}}
    
  32. G. Chierchia, S. Parrilli, G. Poggi, L. Verdoliva & C. Sansone
    PRNU-based detection of small-size image forgeries
    Proc. 17th Int Digital Signal Processing (DSP) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Chierchia2011,
     author = {Chierchia, G. and Parrilli, S. and Poggi, G. and Verdoliva, L. and Sansone, C.},
     title = {PRNU-based detection of small-size image forgeries},
     booktitle = {Proc. 17th Int Digital Signal Processing (DSP) Conf},
     year = {2011},
     pages = {1--6}}
    
  33. C.-H. Choi, J.-H. Choi & H.-K. Lee
    CFA pattern identification of digital cameras using intermediate value counting
    Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
    ACM, 2011, pp. 21-26
    BibTeX
    @inproceedings{Choi2011,
     author = {Choi, Chang-Hee and Choi, Jung-Ho and Lee, Heung-Kyu},
     title = {CFA pattern identification of digital cameras using intermediate value counting},
     booktitle = {Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security},
     publisher = {ACM},
     year = {2011},
     pages = {21--26}}
    
  34. W.-H. Chuang, H. Su & M. Wu
    Exploring compression effects for improved source camera identification using strongly compressed video
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1953-1956
    BibTeX
    @inproceedings{Chuang2011,
     author = {Wei-Hong Chuang and Hui Su and Min Wu},
     title = {Exploring compression effects for improved source camera identification using strongly compressed video},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1953--1956}}
    
  35. P. Clark
    Digital Forensics Tool Testing--Image Metadata in the Cloud
    Department of Computer Science and Media Technology Gjøvik University College, 2011, 2011
    BibTeX
    @mastersthesis{Clark2011,
     author = {Clark, Philip},
     title = {Digital Forensics Tool Testing--Image Metadata in the Cloud},
     school = {Department of Computer Science and Media Technology Gjøvik University College, 2011},
     year = {2011}}
    
  36. V. Conotter & G. Boato
    Analysis of sensor fingerprint for source camera identification
    Electronics Letters, 2011, Vol. 47(25), pp. 1366-1367
    BibTeX
    @article{Conotter2011,
     author = {Conotter, V. and Boato, Giulia },
     title = {Analysis of sensor fingerprint for source camera identification},
     journal = {Electronics Letters},
     year = {2011},
     volume = {47},
     number = {25},
     pages = {1366--1367}}
    
  37. A. Cortiana, V. Conotter, G. Boato & F.G.B.D. Natale
    Performance comparison of denoising filters for source camera identification
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788007
    BibTeX
    @conference{Cortiana2011,
     author = {A. Cortiana and V. Conotter and G. Boato and F. G. B. De Natale},
     title = {Performance comparison of denoising filters for source camera identification},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788007}}
    
  38. L. Del Tongo
    Analisi e sviluppo di metodi per l'individuazione di manipolazioni copy-move in applicazioni di image forensics
    UNIVERSITA DEGLI STUDI DI FIRENZE, 2011
    BibTeX
    @mastersthesis{DelTongo2011,
     author = {Luca Del Tongo},
     title = {Analisi e sviluppo di metodi per l'individuazione di manipolazioni copy-move in applicazioni di image forensics},
     school = {UNIVERSITA DEGLI STUDI DI FIRENZE},
     year = {2011}}
    
  39. Z. Deng, A. Gijsenij & J. Zhang
    Source camera identification using Auto-White Balance approximation
    Proc. IEEE Int Computer Vision (ICCV) Conf
    2011, pp. 57-64
    BibTeX
    @inproceedings{Deng2011,
     author = {Zhonghai Deng and Gijsenij, A. and Jingyuan Zhang},
     title = {Source camera identification using Auto-White Balance approximation},
     booktitle = {Proc. IEEE Int Computer Vision (ICCV) Conf},
     year = {2011},
     pages = {57--64}}
    
  40. K.D. Devi & G. Swamy
    Digital Image Processing Techniques for Detection And Removal of Noise In Images Implementing Blind Source Separation
    International Journal on Computer Science and Engineering (IJCSE), 2011, Vol. 3(8), pp. 3108-3114
    BibTeX
    @article{Devi2011,
     author = {Devi, K. Devaki and Swamy, G.N.},
     title = {Digital Image Processing Techniques for Detection And Removal of Noise In Images Implementing Blind Source Separation},
     journal = {International Journal on Computer Science and Engineering (IJCSE)},
     year = {2011},
     volume = {3},
     number = {8},
     pages = {3108-3114}}
    
  41. L. Dong, X. Kong, B. Wang & X. You
    Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients
    Proc. Sixth Int Image and Graphics (ICIG) Conf
    2011, pp. 234-237
    BibTeX
    @inproceedings{Dong2011,
     author = {Lisha Dong and Xiangwei Kong and Bo Wang and Xin´gang You},
     title = {Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients},
     booktitle = {Proc. Sixth Int Image and Graphics (ICIG) Conf},
     year = {2011},
     pages = {234--237}}
    
  42. J. Fan, A.C. Kot, H. Cao & F. Sattar
    Modeling the EXIF-Image correlation for image manipulation detection
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1945-1948
    BibTeX
    @inproceedings{Fan2011a,
     author = {Jiayuan Fan and Kot, A. C. and Hong Cao and Sattar, F.},
     title = {Modeling the EXIF-Image correlation for image manipulation detection},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1945--1948}}
    
  43. Z. Fan, S. Wang, S. Li & Y. Zhang
    Detection of Double-Compression in JPEG2000 by Using Markov Features
    Wu, Y. (ed.)
    Computing and Intelligent Systems
    Springer Berlin Heidelberg, 2011, Vol. 234, pp. 441-449
    BibTeX
    @incollection{Fan2011,
     author = {Fan, Zhao and Wang, Shilin and Li, Shenghong and Zhang, Yujin},
     title = {Detection of Double-Compression in JPEG2000 by Using Markov Features},
     booktitle = {Computing and Intelligent Systems},
     publisher = {Springer Berlin Heidelberg},
     year = {2011},
     volume = {234},
     pages = {441-449}}
    
  44. X. Feng, I.J. Cox & G. Doerr
    An energy-based method for the forensic detection of Re-sampled images
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Feng2011,
     author = {Xiaoying Feng and Cox, Ingemar J. and Doerr, Gwenael},
     title = {An energy-based method for the forensic detection of Re-sampled images},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2011},
     pages = {1--6}}
    
  45. P. Fieguth
    Statistical Image Processing and Multidimensional Modeling
    Jordan, M., Nowak, R. & Schölkopf, B. (ed.)
    Springer, 2011
    BibTeX
    @book{Fieguth2010,
     author = {Fieguth, Paul},
     title = {Statistical Image Processing and Multidimensional Modeling},
     publisher = {Springer},
     year = {2011}}
    
  46. M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    A Dempster-Shafer framework for decision fusion in image forensics
    Information Forensics and Security (WIFS), 2011 IEEE International Workshop on
    2011, pp. 1-6
    BibTeX
    @inproceedings{Fontani2011,
     author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.},
     title = {A Dempster-Shafer framework for decision fusion in image forensics},
     booktitle = {Information Forensics and Security (WIFS), 2011 IEEE International Workshop on},
     year = {2011},
     pages = {1--6}}
    
  47. J. Fridrich & M. Goljan
    Determining approximate age of digital images using sensor defects
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788006
    BibTeX
    @conference{Fridrich2011,
     author = {Jessica Fridrich and Miroslav Goljan},
     title = {Determining approximate age of digital images using sensor defects},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788006}}
    
  48. G. Friedland, J. Choi, H. Lei & A.J.
    Multimodal Location Estimation on Flickr Videos
    -
    2011
    BibTeX
    @inproceedings{Friedland2011,
     author = {Gerald Friedland and Jaeyoung Choi and Howard Lei and, Adam Janin},
     title = {Multimodal Location Estimation on Flickr Videos},
     booktitle = {-},
     year = {2011}}
    
  49. F. Gharibi, J. RavanJamjah, F. Akhlaghian, B.Z. Azami & J. Alirezaie
    Robust detection of copy-move forgery using texture features
    Proc. 19th Iranian Conf. Electrical Engineering (ICEE)
    2011, pp. 1 - 4
    BibTeX
    @inproceedings{Gharibi2011,
     author = {Gharibi, Fereshteh and RavanJamjah, Javad and Akhlaghian, Fardin and Azami, Bahram Zahir and Alirezaie, Javad},
     title = {Robust detection of copy-move forgery using texture features},
     booktitle = {Proc. 19th Iranian Conf. Electrical Engineering (ICEE)},
     year = {2011},
     pages = {1 - 4}}
    
  50. F. Gharibi, J. RavanJamjah, B. ZahirAzami & F. Akhlaghian
    Digital Camera Identification by Modeling the Probability Distribution of Sensor Pattern Noise
    Proc. 7th Iranian Machine Vision and Image Processing (MVIP)
    2011, pp. 1-4
    BibTeX
    @inproceedings{Gharibi2011a,
     author = {Gharibi, F. and RavanJamjah, J. and ZahirAzami, B. and Akhlaghian, F. },
     title = {Digital Camera Identification by Modeling the Probability Distribution of Sensor Pattern Noise},
     booktitle = {Proc. 7th Iranian Machine Vision and Image Processing (MVIP)},
     year = {2011},
     pages = {1--4}}
    
  51. M. Ghorbani, M. Firouzmand & A. Faraahi
    DWT-DCT (QCD) based copy-move image forgery detection
    Proc. 18th Int Systems, Signals and Image Processing (IWSSIP) Conf
    2011, pp. 1-4
    BibTeX
    @inproceedings{Ghorbani2011,
     author = {Ghorbani, M. and Firouzmand, M. and Faraahi, A.},
     title = {DWT-DCT (QCD) based copy-move image forgery detection},
     booktitle = {Proc. 18th Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2011},
     pages = {1--4}}
    
  52. T. Gloe
    Demystifying histograms of multi-quantised DCT coefficients
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Gloe2011,
     author = {Gloe, T.},
     title = {Demystifying histograms of multi-quantised DCT coefficients},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2011},
     pages = {1--6}}
    
  53. N. Glumov & A. Kuznetsov
    Detection of local artificial changes in images
    Optoelectronics, Instrumentation and Data Processing, Allerton Press, Inc. distributed exclusively by Springer Science+Business Media LLC, 2011, Vol. 47, pp. 207-214
    BibTeX
    @article{Glumov2011,
     author = {Glumov, N. and Kuznetsov, A.},
     title = {Detection of local artificial changes in images},
     journal = {Optoelectronics, Instrumentation and Data Processing},
     publisher = {Allerton Press, Inc. distributed exclusively by Springer Science+Business Media LLC},
     year = {2011},
     volume = {47},
     pages = {207-214}}
    
  54. N. Glumov & A. Kuznetsov
    Analysis of images for local artificial changes with JPEG compression properties
    Pattern Recognition and Image Analysis, MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC., 2011, Vol. 21, pp. 251-253
    BibTeX
    @article{Glumov2011a,
     author = {Glumov, N. and Kuznetsov, A.},
     title = {Analysis of images for local artificial changes with JPEG compression properties},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.},
     year = {2011},
     volume = {21},
     pages = {251-253}}
    
  55. M. Goljan, J. Fridrich & M. Chen
    Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(1), pp. 227-236
    BibTeX
    @article{Goljan2011,
     author = {Goljan, M. and Fridrich, J. and Mo Chen},
     title = {Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {1},
     pages = {227--236}}
    
  56. J. Goodwin & G. Chetty
    Blind Video Tamper Detection Based on Fusion of Source Features
    Proc. Int Digital Image Computing Techniques and Applications (DICTA) Conf
    2011, pp. 608-613
    BibTeX
    @inproceedings{Goodwin2011,
     author = {Goodwin, J. and Chetty, G. },
     title = {Blind Video Tamper Detection Based on Fusion of Source Features},
     booktitle = {Proc. Int Digital Image Computing Techniques and Applications (DICTA) Conf},
     year = {2011},
     pages = {608--613}}
    
  57. M. Hajiaboli
    An Anisotropic Fourth-Order Diffusion Filter for Image Noise Removal
    International Journal of Computer Vision, Springer Netherlands, 2011, Vol. 92, pp. 177-191
    BibTeX
    @article{Hajiaboli2011,
     author = {Hajiaboli, Mohammad},
     title = {An Anisotropic Fourth-Order Diffusion Filter for Image Noise Removal},
     journal = {International Journal of Computer Vision},
     publisher = {Springer Netherlands},
     year = {2011},
     volume = {92},
     pages = {177-191}}
    
  58. Z. He, W. Sun, W. Lu & H. Lu
    Digital image splicing detection based on approximate run length
    Pattern Recognition Letters, 2011, Vol. 32(12), pp. 1591 - 1597
    BibTeX
    @article{He2011,
     author = {Zhongwei He and Wei Sun and Wei Lu and Hongtao Lu},
     title = {Digital image splicing detection based on approximate run length},
     journal = {Pattern Recognition Letters},
     year = {2011},
     volume = {32},
     number = {12},
     pages = {1591 - 1597}}
    
  59. T. Hoglund, P. Brolund & K. Norell
    Identifying camcorders using noise patterns from video clips recorded with image stabilisation
    Proc. 7th Int Image and Signal Processing and Analysis (ISPA) Symp
    2011, pp. 668-671
    BibTeX
    @inproceedings{Hoglund2011,
     author = {Hoglund, Tobias and Brolund, Per and Norell, Kristin},
     title = {Identifying camcorders using noise patterns from video clips recorded with image stabilisation},
     booktitle = {Proc. 7th Int Image and Signal Processing and Analysis (ISPA) Symp},
     year = {2011},
     pages = {668--671}}
    
  60. D. Hoiem & S. Savarese
    Representations and Techniques for 3D Object Recognition & Scene Interpretation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
    Chapter 2 -- Single view metrology
    Morgan & Claypool Publishers, 2011, pp. 4-9
    BibTeX
    @inbook{Hoiem2011,
     author = {Derek Hoiem and Silvio Savarese},
     title = {Representations and Techniques for 3D Object Recognition & Scene Interpretation (Synthesis Lectures on Artificial Intelligence and Machine Learning)},
     publisher = {Morgan & Claypool Publishers},
     year = {2011},
     pages = {4--9}}
    
  61. A. Hore & D. Ziou
    An edge-sensing generic demosaicing algorithm with application to image resampling
    IEEE Transactions on Image Processing, 2011, Vol. 99(99), pp. 9
    BibTeX
    @article{Hore2011,
     author = {Hore, A. and Ziou, D. },
     title = {An edge-sensing generic demosaicing algorithm with application to image resampling},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {99},
     number = {99},
     pages = {9}}
    
  62. D. Hou, Z. Bai & S. Liu
    Image copy-move forgery detection based on "crossing shadow" division
    Proc. Int Electric Information and Control Engineering (ICEICE) Conf
    2011, pp. 1416-1419
    BibTeX
    @inproceedings{Hou2011,
     author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu},
     title = {Image copy-move forgery detection based on "crossing shadow" division},
     booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf},
     year = {2011},
     pages = {1416--1419}}
    
  63. D. Hou, Z. Bai & S. Liu
    Image copy-move forgery detection based on crossing shadow division
    Proc. Int Electric Information and Control Engineering (ICEICE) Conf
    2011, pp. 1416-1419
    BibTeX
    @inproceedings{Hou2011a,
     author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu},
     title = {Image copy-move forgery detection based on crossing shadow division},
     booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf},
     year = {2011},
     pages = {1416--1419}}
    
  64. D. Hou, Z. Bai & S. Liu
    Image copy-move forgery detection based on textquotedblleftcrossing shadowtextquotedblright division
    Proc. Int Electric Information and Control Engineering (ICEICE) Conf
    2011, pp. 1416-1419
    BibTeX
    @inproceedings{Hou2011b,
     author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu},
     title = {Image copy-move forgery detection based on textquotedblleftcrossing shadowtextquotedblright division},
     booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf},
     year = {2011},
     pages = {1416--1419}}
    
  65. W. van Houten, I. Alberink & Z. Geradts
    Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns
    Law, Probability and Risk, 2011, Vol. 10(2), pp. 149-159
    BibTeX
    @article{Houten2011,
     author = {Wiger van Houten and Ivo Alberink and Zeno Geradts},
     title = {Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns},
     journal = {Law, Probability and Risk},
     year = {2011},
     volume = {10},
     number = {2},
     pages = {149-159}}
    
  66. J. Hu, Y. Li, S. Niu & X. Meng
    Exposing digital image forgeries by detecting inconsistencies in principal point
    Proc. Int Computer Science and Service System (CSSS) Conf
    2011, pp. 404-407
    BibTeX
    @inproceedings{Hu2011a,
     author = {Jing Hu and Yezhou Li and Shaozhang Niu and Xianzhe Meng},
     title = {Exposing digital image forgeries by detecting inconsistencies in principal point},
     booktitle = {Proc. Int Computer Science and Service System (CSSS) Conf},
     year = {2011},
     pages = {404--407}}
    
  67. J. Hu, H. Zhang, Q. Gao & H. Huang
    An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection
    Proc. Second Int Networking and Distributed Computing (ICNDC) Conf
    2011, pp. 23-27
    BibTeX
    @inproceedings{Hu2011,
     author = {Jie Hu and Huaxiong Zhang and Qiang Gao and Hai Huang},
     title = {An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection},
     booktitle = {Proc. Second Int Networking and Distributed Computing (ICNDC) Conf},
     year = {2011},
     pages = {23--27}}
    
  68. Y. Hu, C.-T. Li, C. Zhou & X. Lin
    Source Camera Identification Issues: Forensic Features Selection and Robustness
    International Journal of Digital Crime and Forensics (IJDCF), 2011, Vol. 3(4), pp. 1-15
    BibTeX
    @article{Hu2011b,
     author = {Yongjian Hu and Chang-Tsun Li and Changhui Zhou and Xufeng Lin},
     title = {Source Camera Identification Issues: Forensic Features Selection and Robustness},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2011},
     volume = {3},
     number = {4},
     pages = {1-15}}
    
  69. H. Huang, G. Coatrieux, H.Z. Shu, L.M. Luo & C. Roux
    Blind forensics in medical imaging based on Tchebichef image moments
    Proc. Annual Int Engineering in Medicine and Biology Society,EMBC Conf. of the IEEE
    2011, pp. 4473-4476
    BibTeX
    @inproceedings{Huang2011a,
     author = {Huang, H. and Coatrieux, G. and Shu, H. Z. and Luo, L. M. and Roux, C. },
     title = {Blind forensics in medical imaging based on Tchebichef image moments},
     booktitle = {Proc. Annual Int Engineering in Medicine and Biology Society,EMBC Conf. of the IEEE},
     year = {2011},
     pages = {4473--4476}}
    
  70. Y. Huang, W. Lu, W. Sun & D. Long
    Improved DCT-based detection of copy-move forgery in images
    Forensic Science International, 2011, Vol. 206(1-3), pp. 178 - 184
    BibTeX
    @article{Huang2011,
     author = {Yanping Huang and Wei Lu and Wei Sun and Dongyang Long},
     title = {Improved DCT-based detection of copy-move forgery in images},
     journal = {Forensic Science International},
     year = {2011},
     volume = {206},
     number = {1-3},
     pages = {178 - 184}}
    
  71. N. Jacobs, K. Miskell & R. Pless
    Webcam geo-localization using aggregate light levels
    Proc. IEEE Workshop Applications of Computer Vision (WACV)
    2011, pp. 132-138
    BibTeX
    @inproceedings{Jacobs2011,
     author = {Jacobs, N. and Miskell, K. and Pless, R. },
     title = {Webcam geo-localization using aggregate light levels},
     booktitle = {Proc. IEEE Workshop Applications of Computer Vision (WACV)},
     year = {2011},
     pages = {132--138}}
    
  72. Z. Kaizhen & Z.Z.
    A Novel Algorithm of Image Splicing Detection
    School of Electrical Engineering Zhengzhou University, 2011
    BibTeX
    @techreport{Kaizhen2011,
     author = {Zhu Kaizhen and, Zhen Zhang},
     title = {A Novel Algorithm of Image Splicing Detection},
     year = {2011}}
    
  73. P. Kakar & N. Sudha
    Detecting copy-paste forgeries using transform-invariant features
    Proc. IEEE 15th Int Consumer Electronics (ISCE) Symp
    2011, pp. 58-61
    BibTeX
    @inproceedings{Kakar2011,
     author = {Kakar, P. and Sudha, N. },
     title = {Detecting copy-paste forgeries using transform-invariant features},
     booktitle = {Proc. IEEE 15th Int Consumer Electronics (ISCE) Symp},
     year = {2011},
     pages = {58--61}}
    
  74. P. Kakar, N. Sudha & W. Ser
    Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur
    IEEE Transactions on Multimedia, 2011, Vol. 13(3), pp. 443-452
    BibTeX
    @article{Kakar2011a,
     author = {Kakar, P. and Sudha, N. and Ser, W.},
     title = {Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur},
     journal = {IEEE Transactions on Multimedia},
     year = {2011},
     volume = {13},
     number = {3},
     pages = {443--452}}
    
  75. X. Kang, Y. Li, Z. Qu & J. Huang
    Enhancing ROC performance of trustworthy camera source identification
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788009
    BibTeX
    @conference{Kang2011,
     author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang},
     title = {Enhancing ROC performance of trustworthy camera source identification},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788009}}
    
  76. X. Kang, Y. Li, Z. Qu & J. Huang
    Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2011, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Kang2011a,
     author = {Kang, X. and Li, Y. and Qu, Z. and Huang, J.},
     title = {Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  77. K. Karsch, V. Hedau, D. Forsyth & D. Hoiem
    Rendering synthetic objects into legacy photographs
    Proceedings of the 2011 SIGGRAPH Asia Conference
    ACM, 2011, pp. 157:1-157:12
    BibTeX
    @inproceedings{Karsch2011,
     author = {Karsch, Kevin and Hedau, Varsha and Forsyth, David and Hoiem, Derek},
     title = {Rendering synthetic objects into legacy photographs},
     booktitle = {Proceedings of the 2011 SIGGRAPH Asia Conference},
     publisher = {ACM},
     year = {2011},
     pages = {157:1--157:12}}
    
  78. E. Kee, M.K. Johnson & H. Farid
    Digital Image Authentication From JPEG Headers
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1066-1075
    BibTeX
    @article{Kee2011,
     author = {Kee, Eric. and Johnson, Micah. Kimo and Farid, H.},
     title = {Digital Image Authentication From JPEG Headers},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {3},
     pages = {1066--1075}}
    
  79. S. Khan & A. Kulkarni
    Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform
    Proceedings of the International Conference &38; Workshop on Emerging Trends in Technology
    ACM, 2011, pp. 127-131
    BibTeX
    @inproceedings{Khan2011,
     author = {Khan, S. and Kulkarni, A.},
     title = {Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform},
     booktitle = {Proceedings of the International Conference &38; Workshop on Emerging Trends in Technology},
     publisher = {ACM},
     year = {2011},
     pages = {127--131}}
    
  80. H.J. Kim, S. Lim, J. Moon, B. Kim & E.S. Jung
    A photographic forensic case study: Myths, principles and techniques
    Mathematical and Computer Modelling, 2011, Vol. In Press, Accepted Manuscript, pp. -
    BibTeX
    @article{Kim2011,
     author = {Hyoung Joong Kim and Soomin Lim and Jongsub Moon and Boram Kim and Eui S. Jung},
     title = {A photographic forensic case study: Myths, principles and techniques},
     journal = {Mathematical and Computer Modelling},
     year = {2011},
     volume = {In Press, Accepted Manuscript},
     pages = { - }}
    
  81. K.-S. Kim, M.-J. Lee, J.-W. Lee, T.-W. Oh & H.-Y. Lee
    Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging
    Computer Vision and Image Understanding, 2011, Vol. 115(9), pp. 1308 - 1323
    BibTeX
    @article{Kim2011a,
     author = {Kyung-Su Kim and Min-Jeong Lee and Ji-Won Lee and Tae-Woo Oh and Hae-Yeoun Lee},
     title = {Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging},
     journal = {Computer Vision and Image Understanding},
     year = {2011},
     volume = {115},
     number = {9},
     pages = {1308 - 1323}}
    
  82. C. Kommini, K. Ellanti & S. Asadi
    Article: Image based Secret Communication using Double Compression
    International Journal of Computer Applications, 2011, Vol. 21(7), pp. 6-9
    BibTeX
    @article{Kommini2011,
     author = {Chaitanya Kommini and Kamalesh Ellanti and Srinivasulu Asadi},
     title = {Article: Image based Secret Communication using Double Compression},
     journal = {International Journal of Computer Applications},
     year = {2011},
     volume = {21},
     number = {7},
     pages = {6--9}}
    
  83. S. Lai & R. Böhme
    Countering Counter-Forensics: The Case of JPEG Compression
    Filler, T., Pevný, T., Craver, S. & Ker, A. (ed.)
    Information Hiding
    Springer Berlin / Heidelberg, 2011, Vol. 6958, pp. 285-298
    BibTeX
    @incollection{Lai2011,
     author = {Lai, ShiYue and Böhme, Rainer},
     title = {Countering Counter-Forensics: The Case of JPEG Compression},
     booktitle = {Information Hiding},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6958},
     pages = {285-298}}
    
  84. J.-F. Lalonde
    Understanding and recreating visual appearance under natural illumination
    DTIC Document, 2011
    BibTeX
    @techreport{Lalonde2011a,
     author = {Lalonde, Jean-Francois},
     title = {Understanding and recreating visual appearance under natural illumination},
     year = {2011}}
    
  85. J.-F. Lalonde, A.A. Efros & S.G. Narasimhan
    Estimating the natural illumination conditions from a single outdoor image
    International Journal of Computer Vision, 2011, Vol. -, pp. 1-25
    BibTeX
    @article{Lalonde2011,
     author = {Jean-François Lalonde and Alexei A. Efros and Srinivasa G. Narasimhan},
     title = {Estimating the natural illumination conditions from a single outdoor image},
     journal = {International Journal of Computer Vision},
     year = {2011},
     volume = {-},
     pages = {1-25}}
    
  86. C.-T. Li & R. Satta
    On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics
    Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom
    4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), 2011
    BibTeX
    @inproceedings{Li2011f,
     author = {Chang-Tzun Li and Riccardo Satta},
     title = {On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics},
     booktitle = {Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom},
     journal = {4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011)},
     year = {2011}}
    
  87. L. Li, J. Xue, X. Wang & L. Tian
    A Robust Approach to Detect Tampering by Exploring Correlation Patterns
    Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A. & Kropatsch, W. (ed.)
    Computer Analysis of Images and Patterns
    Springer Berlin / Heidelberg, 2011, Vol. 6855, pp. 515-522
    BibTeX
    @incollection{Li2011c,
     author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua},
     title = {A Robust Approach to Detect Tampering by Exploring Correlation Patterns},
     booktitle = {Computer Analysis of Images and Patterns},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6855},
     pages = {515-522}}
    
  88. X.-F. Li, X.-J. Shen & H.-P. Chen
    Blind identification algorithm for retouched images based on Bi-Laplacian
    Journal of Computer Applications, 2011, Vol. 1, pp. -
    BibTeX
    @article{Li2011,
     author = {Li, Xiao-Fei and Shen, Xuan-Jing and Chen, Hai-Peng},
     title = {Blind identification algorithm for retouched images based on Bi-Laplacian},
     journal = {Journal of Computer Applications},
     year = {2011},
     volume = {1},
     pages = {-}}
    
  89. Y. Li
    Decomposed PRNU Library for Forensics on Photos
    International Journal of Digital Library Systems,, 2011, Vol. 2(1), pp. 38
    BibTeX
    @article{Li2011b,
     author = {Yue Li},
     title = {Decomposed PRNU Library for Forensics on Photos},
     journal = {International Journal of Digital Library Systems,},
     year = {2011},
     volume = {2},
     number = {1},
     pages = {38}}
    
  90. Y. Li
    A robust forensic method based on Scale-Invariance Feature Transform
    Proc. Int Multimedia Technology (ICMT) Conf
    2011, pp. 5246-5249
    BibTeX
    @inproceedings{Li2011e,
     author = {Yue Li},
     title = {A robust forensic method based on Scale-Invariance Feature Transform},
     booktitle = {Proc. Int Multimedia Technology (ICMT) Conf},
     year = {2011},
     pages = {5246--5249}}
    
  91. Y. Li & C.-T. Li
    Optimized digital library for digital forenisc based on Decomposed PRNU
    Proc. Int Multimedia Technology (ICMT) Conf
    2011, pp. 610-613
    BibTeX
    @inproceedings{Li2011d,
     author = {Yue Li and Chang-Tsun Li},
     title = {Optimized digital library for digital forenisc based on Decomposed PRNU},
     booktitle = {Proc. Int Multimedia Technology (ICMT) Conf},
     year = {2011},
     pages = {610--613}}
    
  92. S.D. Lin & T. Wu
    An integrated technique for splicing and copy-move forgery image detection
    Proc. 4th Int Image and Signal Processing (CISP) Congress
    2011, Vol. 2, pp. 1086-1090
    BibTeX
    @inproceedings{Lin2011a,
     author = {Lin, S. D. and Tszan Wu},
     title = {An integrated technique for splicing and copy-move forgery image detection},
     booktitle = {Proc. 4th Int Image and Signal Processing (CISP) Congress},
     year = {2011},
     volume = {2},
     pages = {1086--1090}}
    
  93. Y. Lin, D. Varodayan & B. Girod
    Image Authentication Using Distributed Source Coding
    IEEE Transactions on Image Processing, 2011, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Lin2011,
     author = {Lin, Y. and Varodayan, D. and Girod, B.},
     title = {Image Authentication Using Distributed Source Coding},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  94. G. Liu, J. Wang, S. Lian & Y. Dai
    Detect image splicing with artificial blurred boundary
    Mathematical and Computer Modelling, 2011, Vol. In Press, Accepted Manuscript, pp. -
    BibTeX
    @article{Liu2011,
     author = {Guangjie Liu and Junwen Wang and Shiguo Lian and Yuewei Dai},
     title = {Detect image splicing with artificial blurred boundary},
     journal = {Mathematical and Computer Modelling},
     year = {2011},
     volume = {In Press, Accepted Manuscript},
     pages = { - }}
    
  95. Q. Liu
    Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery
    Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
    ACM, 2011, pp. 25-30
    BibTeX
    @inproceedings{Liu2011c,
     author = {Liu, Qingzhong},
     title = {Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery},
     booktitle = {Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence},
     publisher = {ACM},
     year = {2011},
     pages = {25--30}}
    
  96. Q. Liu, X. Cao, C. Deng & X. Guo
    Identifying Image Composites Through Shadow Matte Consistency
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1111-1122
    BibTeX
    @article{Liu2011e,
     author = {Qiguang Liu and Xiaochun Cao and Chao Deng and Xiaojie Guo},
     title = {Identifying Image Composites Through Shadow Matte Consistency},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {3},
     pages = {1111--1122}}
    
  97. Q. Liu, A. Sung & M. Qiao
    A Method to Detect JPEG-Based Double Compression
    Liu, D., Zhang, H., Polycarpou, M., Alippi, C. & He, H. (ed.)
    Advances in Neural Networks -- ISNN 2011
    Springer Berlin / Heidelberg, 2011, Vol. 6676, pp. 466-476
    BibTeX
    @incollection{Liu2011a,
     author = {Liu, Qingzhong and Sung, Andrew and Qiao, Mengyu},
     title = {A Method to Detect JPEG-Based Double Compression},
     booktitle = {Advances in Neural Networks -- ISNN 2011},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6676},
     pages = {466-476}}
    
  98. W. Liu, T. Liu, M. Rong, R. Wang & H. Zhang
    A fast noise variance estimation algorithm
    Proc. Asia Pacific Conf Microelectronics and Electronics (PrimeAsia) Postgraduate Research in
    2011, pp. 61-64
    BibTeX
    @inproceedings{Liu2011b,
     author = {Liu, Wenjiang and Liu, Tao and Rong, Mengtian and Wang, Ruolin and Zhang, Hao},
     title = {A fast noise variance estimation algorithm},
     booktitle = {Proc. Asia Pacific Conf Microelectronics and Electronics (PrimeAsia) Postgraduate Research in},
     year = {2011},
     pages = {61--64}}
    
  99. Z. Liu, X. Wang & J. Chen
    Passive Forensics Method to Detect Tampering for Double JPEG Compression Image
    Proc. IEEE Int Multimedia (ISM) Symp
    2011, pp. 185-189
    BibTeX
    @inproceedings{Liu2011d,
     author = {Liu, Zhenli and Wang, Xiaofeng and Chen, Jing},
     title = {Passive Forensics Method to Detect Tampering for Double JPEG Compression Image},
     booktitle = {Proc. IEEE Int Multimedia (ISM) Symp},
     year = {2011},
     pages = {185--189}}
    
  100. W. Lu, W. Sun, F.-L. Chung & H. Lu
    Revealing digital fakery using multiresolution decomposition and higher order statistics
    Engineering Applications of Artificial Intelligence, 2011, Vol. 24(4), pp. 666 - 672
    BibTeX
    @article{Lu2011,
     author = {Wei Lu and Wei Sun and Fu-Lai Chung and Hongtao Lu},
     title = {Revealing digital fakery using multiresolution decomposition and higher order statistics},
     journal = {Engineering Applications of Artificial Intelligence},
     year = {2011},
     volume = {24},
     number = {4},
     pages = {666 - 672}}
    
  101. A.Y.-D. Lv, B.X.-J. Shen & C.C. Hai-Peng
    Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation
    Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation, 2011
    BibTeX
    @techreport{Lv2011,
     author = {Lv , A. Ying-Da and Shen, B. Xuan-Jing and Chen C. Hai-Peng},
     title = {Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation},
     year = {2011}}
    
  102. Y. Lv, X. Shen & H. Chen
    An improved image blind identification based on inconsistency in light source direction
    The Journal of Supercomputing, Springer Netherlands, 2011, Vol. 19(2), pp. 211-218
    BibTeX
    @article{Lv2011a,
     author = {Lv, Yingda and Shen, Xuanjing and Chen, Haipeng},
     title = {An improved image blind identification based on inconsistency in light source direction},
     journal = {The Journal of Supercomputing},
     publisher = {Springer Netherlands},
     year = {2011},
     volume = {19},
     number = {2},
     pages = {211-218}}
    
  103. S.D. Mahalakshmi, K. Vijayalakshmi & S. Priyadharsini
    Digital image forgery detection and estimation by exploring basic image manipulations
    Digital Investigation, 2011, Vol. In Press, Corrected Proof, pp. -
    BibTeX
    @article{Mahalakshmi2011,
     author = {Mahalakshmi,S. Devi and K. Vijayalakshmi and S. Priyadharsini},
     title = {Digital image forgery detection and estimation by exploring basic image manipulations},
     journal = {Digital Investigation},
     year = {2011},
     volume = {In Press, Corrected Proof},
     pages = { - }}
    
  104. B. Mahdian & S. Saic
    Identifying image forgeries using change points detection
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788008
    BibTeX
    @conference{Mahdian2011a,
     author = {Babak Mahdian and Stanislav Saic},
     title = {Identifying image forgeries using change points detection},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788008}}
    
  105. B. Mahdian & S. Saic
    Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment
    Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
    ACM, 2011, pp. 176:1-176:5
    BibTeX
    @inproceedings{Mahdian2011b,
     author = {Mahdian, Babak and Saic, Stanislav},
     title = {Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment},
     booktitle = {Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies},
     publisher = {ACM},
     year = {2011},
     pages = {176:1--176:5}}
    
  106. B. Mahdian, S. Saic & R. Nedbal
    JPEG Quantization Tables Forensics: A Statistical Approach
    Sako, H., Franke, K. & Saitoh, S. (ed.)
    Computational Forensics
    Springer Berlin / Heidelberg, 2011, Vol. 6540, pp. 150-159
    BibTeX
    @incollection{Mahdian2011,
     author = {Mahdian, Babak and Saic, Stanislav and Nedbal, Radim},
     title = {JPEG Quantization Tables Forensics: A Statistical Approach},
     booktitle = {Computational Forensics},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6540},
     pages = {150-159}}
    
  107. A.K. Mikkilineni, N. Khanna & E.J. Delp
    Forensic printer detection using intrinsic signatures
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 78800R
    BibTeX
    @conference{Mikkilineni2011,
     author = {Aravind K. Mikkilineni and Nitin Khanna and Edward J. Delp},
     title = {Forensic printer detection using intrinsic signatures},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {78800R}}
    
  108. S. Milani, M. Tagliasacchi & S. Tubaro
    Discriminating Multiple Jpeg Compression Using First Digit Features
    Dipartimento di Elettronica e Informazione - Politecnico di Milano, 2011
    BibTeX
    @techreport{Milani2011,
     author = {Simone Milani and Marco Tagliasacchi and Stefano Tubaro},
     title = {Discriminating Multiple Jpeg Compression Using First Digit Features},
     year = {2011}}
    
  109. G. Muhammad, M. Hussain, K. Khawaji & G. Bebis
    Blind Copy Move Image Forgery Detection using Dyadic Undecimated Wavelet Transform
    Proceedings of the 17th International Conference on Digital Signal Processing
    College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia, 2011
    BibTeX
    @inproceedings{Muhammad2011,
     author = {Ghulam Muhammad and Muhammad Hussain and Khalid Khawaji and George Bebis},
     title = {Blind Copy Move Image Forgery Detection using Dyadic Undecimated Wavelet Transform},
     booktitle = {Proceedings of the 17th International Conference on Digital Signal Processing},
     year = {2011}}
    
  110. G. Muhammad & M.S. Hussain
    Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
    Proceedings of the Third International Conference on Internet Multimedia Computing and Service
    ACM, 2011, pp. 95-98
    BibTeX
    @inproceedings{Muhammad2011a,
     author = {Muhammad, Ghulam and Hussain, Muhammad Shamim},
     title = {Robust copy-move image forgery detection using undecimated wavelets and Zernike moments},
     booktitle = {Proceedings of the Third International Conference on Internet Multimedia Computing and Service},
     publisher = {ACM},
     year = {2011},
     pages = {95--98}}
    
  111. N. Muhammad, M. Hussain, G. Muhammad & G. Bebis
    A Non-intrusive Method for Copy-Move Forgery Detection
    Bebis, G., Boyle, R., Parvin, B., Koracin, D., Wang, S., Kyungnam, K., Benes, B., Moreland, K., Borst, C., DiVerdi, S., Yi-Jen, C. & Ming, J. (ed.)
    Advances in Visual Computing
    Springer Berlin / Heidelberg, 2011, Vol. 6939, pp. 516-525
    BibTeX
    @incollection{Muhammad2011b,
     author = {Muhammad, Najah and Hussain, Muhammad and Muhammad, Ghulam and Bebis, George},
     title = {A Non-intrusive Method for Copy-Move Forgery Detection},
     booktitle = {Advances in Visual Computing},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6939},
     pages = {516-525}}
    
  112. N. Muhammad, M. Hussain, G. Muhammad & G. Bebis
    Copy-Move Forgery Detection Using Dyadic Wavelet Transform
    Proc. Eighth Int Computer Graphics, Imaging and Visualization (CGIV) Conf
    2011, pp. 103-108
    BibTeX
    @inproceedings{Muhammad2011c,
     author = {Muhammad, Najah and Hussain, Muhammad and Muhammad, Ghulam and Bebis, George},
     title = {Copy-Move Forgery Detection Using Dyadic Wavelet Transform},
     booktitle = {Proc. Eighth Int Computer Graphics, Imaging and Visualization (CGIV) Conf},
     year = {2011},
     pages = {103--108}}
    
  113. S. Murali, B.S. Anami & G.B. Chittapur
    Detection of Copy-Create Image Forgery Using Luminance Level Techniques
    Proc. Third National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
    2011, pp. 215-218
    BibTeX
    @inproceedings{Murali2011,
     author = {Murali, S. and Anami, B. S. and Chittapur, G. B. },
     title = {Detection of Copy-Create Image Forgery Using Luminance Level Techniques},
     booktitle = {Proc. Third National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)},
     year = {2011},
     pages = {215--218}}
    
  114. G. Narayanan & Y. Shi
    A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 75-89
    BibTeX
    @incollection{Narayanan2011,
     author = {Narayanan, Gopal and Shi, Yun},
     title = {A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images},
     booktitle = {Digital Watermarking},
     journal = {Lecture Notes in Computer Science},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {75-89}}
    
  115. H.C. Nguyen & S. Katzenbeisser
    Security of copy-move forgery detection techniques
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011, pp. 1864-1867
    BibTeX
    @inproceedings{Nguyen2011,
     author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan},
     title = {Security of copy-move forgery detection techniques},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011},
     pages = {1864--1867}}
    
  116. L. Özparlak & I. Avcibas
    Digital image forensics using wavelet based image models
    Proc. IEEE 19th Conf. Signal Processing and Communications Applications (SIU)
    2011, pp. 335-338
    BibTeX
    @inproceedings{Oezparlak2011,
     author = {Özparlak, L. and Avcibas, I.},
     title = {Digital image forensics using wavelet based image models},
     booktitle = {Proc. IEEE 19th Conf. Signal Processing and Communications Applications (SIU)},
     year = {2011},
     pages = {335--338}}
    
  117. L. Özparlak & I. Avcibas
    Differentiating Between Images Using Wavelet Based Transforms: A Comparative Study
    IEEE Transactions on Information Forensics and Security, 2011, Vol. PP(99), pp. 1
    BibTeX
    @article{Oezparlak2011b,
     author = {Özparlak, L. and Avcibas, I.},
     title = {Differentiating Between Images Using Wavelet Based Transforms: A Comparative Study},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  118. F. Pan & J. Huang
    Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin Heidelberg, 2011, Vol. 6526, pp. 23-28
    BibTeX
    @incollection{Pan2011b,
     author = {Pan, Feng and Huang, Jiwu},
     title = {Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {23-28}}
    
  119. L. Pan & N. Trepanic
    Image source detection : a case study on Facebook images taken by iPhones
    ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop
    2011
    BibTeX
    @inproceedings{Pan2011a,
     author = {Pan, Lei and Trepanic, Nijaz},
     title = {Image source detection : a case study on Facebook images taken by iPhones},
     booktitle = {ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop},
     year = {2011}}
    
  120. X. Pan, X. Zhang & S. Lyu
    Exposing image forgery with blind noise estimation
    Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
    ACM, 2011, pp. 15-20
    BibTeX
    @inproceedings{Pan2011,
     author = {Pan, Xunyu and Zhang, Xing and Lyu, Siwei},
     title = {Exposing image forgery with blind noise estimation},
     booktitle = {Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security},
     publisher = {ACM},
     year = {2011},
     pages = {15--20}}
    
  121. F. Peng & M. Long
    Identification of Photographic Images and Computer Graphics Using Fractal Feature of Sensor Pattern Noise
    International Journal of Advancements in Computing Technology, 2011, Vol. 3(3), pp. 222-227
    BibTeX
    @article{Peng2011a,
     author = {Fei Peng and Min Long},
     title = {Identification of Photographic Images and Computer Graphics Using Fractal Feature of Sensor Pattern Noise},
     journal = {International Journal of Advancements in Computing Technology},
     year = {2011},
     volume = {3},
     number = {3},
     pages = {222-227}}
    
  122. F. Peng, Y. ying Nie & M. Long
    A complete passive blind image copy-move forensics scheme based on compound statistics features
    Forensic Science International, 2011, Vol. In Press, Corrected Proof, pp. -
    BibTeX
    @article{Peng2011,
     author = {Fei Peng and Yun-ying Nie and Min Long},
     title = {A complete passive blind image copy-move forensics scheme based on compound statistics features},
     journal = {Forensic Science International},
     year = {2011},
     volume = {In Press, Corrected Proof},
     pages = { - }}
    
  123. R. Poisel & S. Tjoa
    Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art
    Proc. Sixth Int IT Security Incident Management and IT Forensics (IMF) Conf
    2011, pp. 48-61
    BibTeX
    @inproceedings{Poisel2011,
     author = {Poisel, R. and Tjoa, S.},
     title = {Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art},
     booktitle = {Proc. Sixth Int IT Security Incident Management and IT Forensics (IMF) Conf},
     year = {2011},
     pages = {48--61}}
    
  124. R. Poisel & S. Tjoa
    Forensische Unterschung Multimedialer Daten
    9. Sicherheitskonferenz Krems, 2011
    2011
    BibTeX
    @inproceedings{Poisel2011a,
     author = {Rainer Poisel and Simon Tjoa},
     title = {Forensische Unterschung Multimedialer Daten},
     booktitle = {9. Sicherheitskonferenz Krems, 2011},
     year = {2011}}
    
  125. G. Qadir, X. Zhao, A.T. Ho & M. Casey
    Image forensic of glare feature for improving image retrieval using Benford´s Law
    Proc. IEEE Int Circuits and Systems (ISCAS) Symp
    2011, pp. 2661-2664
    BibTeX
    @inproceedings{Qadir2011,
     author = {Qadir, Ghulam and Zhao, Xi and Ho, Anthony TS and Casey, Matthew},
     title = {Image forensic of glare feature for improving image retrieval using Benford´s Law},
     booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp},
     year = {2011},
     pages = {2661--2664}}
    
  126. Y.-C. Qi, X.-S. Xing & H.-F.-Z. Zhang
    Blind Detection of Eclosion Forgeries Based on Curvelet Image Enhancement and Edge Detection
    Proc. Int Multimedia and Signal Processing (CMSP) Conf
    2011, Vol. 1, pp. 316-320
    BibTeX
    @inproceedings{Qi2011,
     author = {Qi, Yin-Cheng and Xing, Xiao-Shuang and Zhang, Hua-Fang-Zi},
     title = {Blind Detection of Eclosion Forgeries Based on Curvelet Image Enhancement and Edge Detection},
     booktitle = {Proc. Int Multimedia and Signal Processing (CMSP) Conf},
     year = {2011},
     volume = {1},
     pages = {316--320}}
    
  127. M. Qiao, A. Sung, Q. Liu & B. Ribeiro
    A Novel Approach for Detection of Copy-Move Forgery
    Proceedings of the ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences
    2011
    BibTeX
    @conference{Qiao2011,
     author = {Mengyu Qiao and Andrew Sung and Qingzhong Liu and Bernardete Ribeiro},
     title = {A Novel Approach for Detection of Copy-Move Forgery},
     booktitle = {Proceedings of the ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences},
     year = {2011}}
    
  128. A. Rocha, W. Scheirer, T. Boult & S. Goldenstein
    Vision of the unseen: Current trends and challenges in digital image and video forensics
    ACM Comput. Surv., ACM, 2011, Vol. 43(4), pp. 26:1-26:42
    BibTeX
    @article{Rocha2011,
     author = {Rocha, Anderson and Scheirer, Walter and Boult, Terrance and Goldenstein, Siome},
     title = {Vision of the unseen: Current trends and challenges in digital image and video forensics},
     journal = {ACM Comput. Surv.},
     publisher = {ACM},
     year = {2011},
     volume = {43},
     number = {4},
     pages = {26:1--26:42}}
    
  129. M. Rostami, M. Babaie-Zadeh, S. Samadi & C. Jutten
    Blind source separation of discrete finite alphabet sources using a single mixture
    Proc. IEEE Statistical Signal Processing Workshop (SSP)
    2011, pp. 709-712
    BibTeX
    @inproceedings{Rostami2011,
     author = {Rostami, M. and Babaie-Zadeh, M. and Samadi, S. and Jutten, C. },
     title = {Blind source separation of discrete finite alphabet sources using a single mixture},
     booktitle = {Proc. IEEE Statistical Signal Processing Workshop (SSP)},
     year = {2011},
     pages = {709--712}}
    
  130. A. Roy, S. Mitra & R. Agrawal
    A novel method for detecting light source for digital images forensic
    Opto-Electronics Review, Versita, co-published with Springer-Verlag GmbH, 2011, Vol. 19, pp. 211-218
    BibTeX
    @article{Roy2011,
     author = {Roy, A. and Mitra, S. and Agrawal, R.},
     title = {A novel method for detecting light source for digital images forensic},
     journal = {Opto-Electronics Review},
     publisher = {Versita, co-published with Springer-Verlag GmbH},
     year = {2011},
     volume = {19},
     pages = {211-218}}
    
  131. P. Saboia, T. Carvalho & A. Rocha
    Eye specular highlights telltales for digital forensics: A machine learning approach
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1937-1940
    BibTeX
    @inproceedings{Saboia2011,
     author = {Saboia, P. and Carvalho, T. and Rocha, A. },
     title = {Eye specular highlights telltales for digital forensics: A machine learning approach},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1937--1940}}
    
  132. J.-J. Shen & W.-C. Huang
    The First Robust Image Tamper Detection Scheme under Brightness
    Proc. Fifth Int Genetic and Evolutionary Computing (ICGEC) Conf
    2011, pp. 200-203
    BibTeX
    @inproceedings{Shen2011,
     author = {Jau-Ji Shen and Wei-Cheng Huang},
     title = {The First Robust Image Tamper Detection Scheme under Brightness},
     booktitle = {Proc. Fifth Int Genetic and Evolutionary Computing (ICGEC) Conf},
     year = {2011},
     pages = {200--203}}
    
  133. X.-j. Shen, B.-h. Tang, i.X.-f. L & H.-p. Chen
    A Blur Image Blind Identify Algorithm Based on the Edge Feature
    Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
    2011, pp. 309-313
    BibTeX
    @inproceedings{Shen2011a,
     author = {Shen, Xuan-jing and Tang, Bo-hao and L,i Xiao-fei and Chen, Hai-peng},
     title = {A Blur Image Blind Identify Algorithm Based on the Edge Feature},
     booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2011},
     pages = {309--313}}
    
  134. B. Shivakumar & S. Baboo
    Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors
    International Journal of Computer Applications, 2011, Vol. 27(3), pp. 9-17
    BibTeX
    @article{Shivakumar2011,
     author = {B.L. Shivakumar and S.Santhosh Baboo},
     title = {Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors},
     journal = {International Journal of Computer Applications},
     year = {2011},
     volume = {27},
     number = {3},
     pages = {9-17}}
    
  135. V.K. Singh & R. Tripathi
    Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method
    International Journal of Advanced Science and Technology, 2011, Vol. 35, pp. 93-102
    BibTeX
    @article{Singh2011,
     author = {Vivek Kumar Singh and R.C. Tripathi},
     title = {Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method},
     journal = {International Journal of Advanced Science and Technology},
     year = {2011},
     volume = {35},
     pages = {93--102}}
    
  136. G.-S. Song, Y.-I. Yun & W.-H. Lee
    A new estimation approach of resampling factors using threshold-based peak detection
    Proc. IEEE Int Consumer Electronics (ICCE) Conf
    2011, pp. 731-732
    BibTeX
    @inproceedings{Song2011,
     author = {Geun-Sil Song and Yong-In Yun and Won-Hyung Lee},
     title = {A new estimation approach of resampling factors using threshold-based peak detection},
     booktitle = {Proc. IEEE Int Consumer Electronics (ICCE) Conf},
     year = {2011},
     pages = {731--732}}
    
  137. M.C. Stamm & K.J.R. Liu
    Anti-forensics for frame deletion/addition in MPEG video
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011, pp. 1876-1879
    BibTeX
    @inproceedings{Stamm2011,
     author = {Stamm, Matthew C. and Liu, K. J. Ray},
     title = {Anti-forensics for frame deletion/addition in MPEG video},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011},
     pages = {1876--1879}}
    
  138. M.C. Stamm & K.J.R. Liu
    Anti-forensics of digital image compression
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1050-1065
    BibTeX
    @article{Stamm2011a,
     author = {Stamm, M. C. and Liu, K. J. R. },
     title = {Anti-forensics of digital image compression},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {3},
     pages = {1050--1065}}
    
  139. Y. Su, Y. Han & C. Zhang
    Detection of blue screen based on edge features
    Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International
    2011, Vol. 2, pp. 469-472
    BibTeX
    @inproceedings{Su2011,
     author = {Y. Su and Y. Han and C. Zhang},
     title = {Detection of blue screen based on edge features},
     booktitle = {Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International},
     year = {2011},
     volume = {2},
     pages = {469--472}}
    
  140. P.K. Sunil Kumar, S. Das & S. Mukherjee
    Copy-Move Forgery Detection in Digital Images: Progress and Challenges
    International Journal on Computer Science and Engineering, 2011, Vol. 3, pp. 652-663
    BibTeX
    @article{SunilKumar2011,
     author = {Sunil Kumar, P. K. and Das, Shally and Mukherjee, S.},
     title = {Copy-Move Forgery Detection in Digital Images: Progress and Challenges},
     journal = {International Journal on Computer Science and Engineering},
     year = {2011},
     volume = {3},
     pages = {652-663}}
    
  141. P. Sutthiwan, Y. Shi, H. Zhao, T.-T. Ng & W. Su
    Markovian Rake Transform for Digital Image Tampering Detection
    Shi, Y., Emmanuel, S., Kankanhalli, M., Chang, S.-F., Radhakrishnan, R., Ma, F. & Zhao, L. (ed.)
    Transactions on Data Hiding and Multimedia Security VI
    Springer Berlin / Heidelberg, 2011, Vol. 6730, pp. 1-17
    BibTeX
    @incollection{Sutthiwan2011,
     author = {Sutthiwan, Patchara and Shi, Yun and Zhao, Hong and Ng, Tian-Tsong and Su, Wei},
     title = {Markovian Rake Transform for Digital Image Tampering Detection},
     booktitle = {Transactions on Data Hiding and Multimedia Security VI},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6730},
     pages = {1-17}}
    
  142. G.R. Talmale, A.V. Talhan & R.V. Dharaskar
    Analysis of multimedia forensic technique
    Proceedings of the 2011 International Conference on Communication, Computing & Security (ICCCS 2011)
    Proceedings of the 2011 International Conference on Communication, Computing & Security, ACM, 2011, pp. 289-294
    BibTeX
    @inproceedings{Talmale2011,
     author = {Talmale, G. R. and Talhan, A. V. and Dharaskar, R. V.},
     title = {Analysis of multimedia forensic technique},
     booktitle = {Proceedings of the 2011 International Conference on Communication, Computing & Security (ICCCS 2011)},
     journal = {Proceedings of the 2011 International Conference on Communication, Computing & Security},
     publisher = {ACM},
     year = {2011},
     pages = {289--294}}
    
  143. Y. Tomioka & H. Kitazawa
    Digital camera identification based on the clustered pattern noise of image sensors
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2011, pp. 1-4
    BibTeX
    @inproceedings{Tomioka2011,
     author = {Tomioka, Y. and Kitazawa, H. },
     title = {Digital camera identification based on the clustered pattern noise of image sensors},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2011},
     pages = {1--4}}
    
  144. G. Valenzise, V. Nobile, M. Tagliasacchi & S. Tubaro
    Countering JPEG anti-forensics
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1949-1952
    BibTeX
    @inproceedings{Valenzise2011a,
     author = {Valenzise, Giuseppe and Nobile, V. and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Countering JPEG anti-forensics},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1949--1952}}
    
  145. G. Valenzise, M. Tagliasacchi & S. Tubaro
    The Cost of JPEG Compression Anti-forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011
    BibTeX
    @inproceedings{Valenzise2011,
     author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {The Cost of JPEG Compression Anti-forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011}}
    
  146. D. Vazquez-Padin & F. Perez-Gonzalez
    Prefilter design for forensic resampling estimation
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2011
    BibTeX
    @inproceedings{Vazquez-Padin2011,
     author = {Vazquez-Padin, David and Perez-Gonzalez, Fernando},
     title = {Prefilter design for forensic resampling estimation},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2011}}
    
  147. S.V. Viraktamath & G.V. Attimarad
    Impact of Quantization Matrix on the Performance of JPEG
    International Journal of Future Generation Communication and Networking, 2011, Vol. 4(3), pp. 107-118
    BibTeX
    @article{Viraktamath2011,
     author = {S. V. Viraktamath and Girish V. Attimarad},
     title = {Impact of Quantization Matrix on the Performance of JPEG},
     journal = {International Journal of Future Generation Communication and Networking},
     year = {2011},
     volume = {4},
     number = {3},
     pages = {107--118}}
    
  148. C.-T. Wang, C.-L. Wang, L.-C. Li & M.-Y. Hsieh
    The image tampered detection and restoration using the characteristic values
    Proc. Int Machine Learning and Cybernetics (ICMLC) Conf
    2011, Vol. 4, pp. 1845-1850
    BibTeX
    @inproceedings{Wang2011f,
     author = {Ching-Te Wang and Ching-Lin Wang and Lin-Chun Li and Ming-Yuan Hsieh},
     title = {The image tampered detection and restoration using the characteristic values},
     booktitle = {Proc. Int Machine Learning and Cybernetics (ICMLC) Conf},
     year = {2011},
     volume = {4},
     pages = {1845--1850}}
    
  149. W. Wang, J. Dong & T. Tan
    Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 120-133
    BibTeX
    @incollection{Wang2011,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {120-133}}
    
  150. W. Wang, J. Dong & T. Tan
    Exploring DCT coefficient quantization effect for image tampering localization
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2011, pp. 1-6
    BibTeX
    @inproceedings{Wang2011b,
     author = {Wei Wang and Jing Dong and Tieniu Tan},
     title = {Exploring DCT coefficient quantization effect for image tampering localization},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2011},
     pages = {1--6}}
    
  151. W. Wang & R.D. Wang
    The Analysis and Detection of Double JPEG2000 Compression
    Key Engineering Materials, 2011, Vol. (Volumes 474 - 476) Advanced Materials and Computer Science, pp. 2043-2048
    BibTeX
    @article{Wang2011a,
     author = {Wei Wang and Rang Ding Wang},
     title = {The Analysis and Detection of Double JPEG2000 Compression},
     journal = {Key Engineering Materials},
     year = {2011},
     volume = {(Volumes 474 - 476) Advanced Materials and Computer Science},
     pages = {2043-2048}}
    
  152. X. Wang, X. Zhang, Z. Li & S. Wang
    A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks
    Multimedia Information Networking and Security (MINES), 2011 Third International Conference on
    2011, pp. 304-308
    BibTeX
    @inproceedings{Wang2011c,
     author = {Xiaofeng Wang and Xiaoni Zhang and Zhen Li and Shangping Wang},
     title = {A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks},
     booktitle = {Multimedia Information Networking and Security (MINES), 2011 Third International Conference on},
     year = {2011},
     pages = {304--308}}
    
  153. Q. Wu, S. Wang & X. Zhang
    Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images
    IEEE Signal Processing Letters, 2011, Vol. 18(10), pp. 559-562
    BibTeX
    @article{Wu2011,
     author = {Qiumin Wu and Shuozhong Wang and Xinpeng Zhang},
     title = {Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images},
     journal = {IEEE Signal Processing Letters},
     year = {2011},
     volume = {18},
     number = {10},
     pages = {559--562}}
    
  154. R. Wu, X. Li & B. Yang
    Identifying computer generated graphics via histogram features
    Image Processing (ICIP), 2011 18th IEEE International Conference on
    2011, pp. 1933-1936
    BibTeX
    @inproceedings{Wu2011b,
     author = {Ruoyu Wu and Xiaolong Li and Bin Yang},
     title = {Identifying computer generated graphics via histogram features},
     booktitle = {Image Processing (ICIP), 2011 18th IEEE International Conference on},
     year = {2011},
     pages = {1933--1936}}
    
  155. X. Wu & Z. Fang
    Image Splicing Detection Using Illuminant Color Inconsistency
    Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
    2011, pp. 600-603
    BibTeX
    @inproceedings{Wu2011a,
     author = {Xuemin Wu and Zhen Fang},
     title = {Image Splicing Detection Using Illuminant Color Inconsistency},
     booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2011},
     pages = {600--603}}
    
  156. B. Xu, J. Wang, G. Liu & Y. Dai
    Photorealistic computer graphics forensics based on leading digit law
    Journal of Electronics (China), Science Press, co-published with Springer-Verlag GmbH, 2011, Vol. 28, pp. 95-100
    BibTeX
    @article{Xu2011,
     author = {Xu, Bo and Wang, Junwen and Liu, Guangjie and Dai, Yuewei},
     title = {Photorealistic computer graphics forensics based on leading digit law},
     journal = {Journal of Electronics (China)},
     publisher = {Science Press, co-published with Springer-Verlag GmbH},
     year = {2011},
     volume = {28},
     pages = {95-100}}
    
  157. H. Yao, T. Qiao, Z. Tang, Y. Zhao & H. Mao
    Detecting Copy-Move Forgery Using Non-negative Matrix Factorization
    Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
    2011, pp. 591-594
    BibTeX
    @inproceedings{Yao2011,
     author = {Heng Yao and Tong Qiao and Zhenjun Tang and Yan Zhao and Hualing Mao},
     title = {Detecting Copy-Move Forgery Using Non-negative Matrix Factorization},
     booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2011},
     pages = {591--594}}
    
  158. I. Yerushalmy & H. Hel-Or
    Digital Image Forgery Detection Based on Lens and Sensor Aberration
    International Journal of Computer Vision, Springer Netherlands, 2011, Vol. 92, pp. 71-91
    BibTeX
    @article{Yerushalmy2011,
     author = {Yerushalmy, Ido and Hel-Or, Hagit},
     title = {Digital Image Forgery Detection Based on Lens and Sensor Aberration},
     journal = {International Journal of Computer Vision},
     publisher = {Springer Netherlands},
     year = {2011},
     volume = {92},
     pages = {71-91}}
    
  159. J. Yu, S. Craver & E. Li
    Toward the identification of DSLR lenses by chromatic aberration
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788010
    BibTeX
    @conference{Yu2011,
     author = {Jun Yu and Scott Craver and Enping Li},
     title = {Toward the identification of DSLR lenses by chromatic aberration},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788010}}
    
  160. H. Yuan
    Blind Forensics of Median Filtering in Digital Images
    Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint ConfMedian
    IEEE Transactions on Information Forensics and Security, 2011(99), pp. 332 - 335
    BibTeX
    @inproceedings{Yuan,
     author = {Yuan, H.},
     title = {Blind Forensics of Median Filtering in Digital Images},
     booktitle = {Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint ConfMedian},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     number = {99},
     pages = {332 - 335}}
    
  161. X. Zhao, P. Bateman & A. Ho
    Image Authentication Using Active Watermarking and Passive Forensics Techniques
    Lin, W., Tao, D., Kacprzyk, J., Li, Z., Izquierdo, E. & Wang, H. (ed.)
    Multimedia Analysis, Processing and Communications
    Springer Berlin / Heidelberg, 2011, Vol. 346, pp. 139-183
    BibTeX
    @incollection{Zhao2011,
     author = {Zhao, Xi and Bateman, Philip and Ho, Anthony},
     title = {Image Authentication Using Active Watermarking and Passive Forensics Techniques},
     booktitle = {Multimedia Analysis, Processing and Communications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {346},
     pages = {139-183}}
    
  162. X. Zhao, J. Li, S. Li & S. Wang
    Detecting Digital Image Splicing in Chroma Spaces
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 12-22
    BibTeX
    @incollection{Zhao2011a,
     author = {Zhao, Xudong and Li, Jianhua and Li, Shenghong and Wang, Shilin},
     title = {Detecting Digital Image Splicing in Chroma Spaces},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {12--22}}
    
  163. Y. Zhao, F. Shih & Y. Shi
    Passive Detection of Paint-Doctored JPEG Images
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 1-11
    BibTeX
    @incollection{Zhao2011b,
     author = {Zhao, Yu and Shih, Frank and Shi, Yun},
     title = {Passive Detection of Paint-Doctored JPEG Images},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {1-11}}
    
  164. G. Zhou & D. Lv
    An Overview of Digital Watermarking in Image Forensics
    Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint Conf
    2011, pp. 332-335
    BibTeX
    @inproceedings{Zhou,
     author = {Zhou, Guojuan and Lv, Dianji},
     title = {An Overview of Digital Watermarking in Image Forensics},
     booktitle = {Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint Conf},
     year = {2011},
     pages = {332--335}}
    
  165. S. Zhu, X. Cao & H. Zhao
    Photographic Composite Detection Using Two Circles
    Proc. Sixth Int Image and Graphics (ICIG) Conf
    2011, pp. 858-863
    BibTeX
    @inproceedings{Zhu2011,
     author = {Shuyi Zhu and Xiaochun Cao and Handong Zhao},
     title = {Photographic Composite Detection Using Two Circles},
     booktitle = {Proc. Sixth Int Image and Graphics (ICIG) Conf},
     year = {2011},
     pages = {858--863}}
    
  166. L. Zhulong, L. Xianghua & Z. Yuqian
    Passive Detection of Copy-paste Tampering for Digital Image Forensics
    Proc. Int Intelligent Computation Technology and Automation (ICICTA) Conf
    2011, Vol. 2, pp. 649-652
    BibTeX
    @inproceedings{Zhulong2011,
     author = {Liu Zhulong and Li Xianghua and Zhao Yuqian},
     title = {Passive Detection of Copy-paste Tampering for Digital Image Forensics},
     booktitle = {Proc. Int Intelligent Computation Technology and Automation (ICICTA) Conf},
     year = {2011},
     volume = {2},
     pages = {649--652}}
    
  167. M. Zimba & S. Xingming
    DWT-PCA (EVD) Based Copy-move Image Forgery Detection
    International Journal of Digital Content Technology and its Applications., 2011, Vol. 5, pp. 251-258
    BibTeX
    @article{Zimba2011,
     author = {Michael Zimba and Sun Xingming},
     title = {DWT-PCA (EVD) Based Copy-move Image Forgery Detection},
     journal = {International Journal of Digital Content Technology and its Applications.},
     year = {2011},
     volume = {5},
     pages = {251--258}}
    
  168. J. Zuo, S. Pan, B. Liu & X. Liao
    Tampering detection for composite images based on re-sampling and JPEG compression
    Proc. First Asian Conf. Pattern Recognition (ACPR)
    2011, pp. 169-173
    BibTeX
    @inproceedings{Zuo2011,
     author = {Juxian Zuo and Shengjun Pan and Benyong Liu and Xiang Liao},
     title = {Tampering detection for composite images based on re-sampling and JPEG compression},
     booktitle = {Proc. First Asian Conf. Pattern Recognition (ACPR)},
     year = {2011},
     pages = {169--173}}
    


2010

  1. Adobe
    XMP Specification Part 1 Data Model, Serialization, and Core Properties
    Adobe, 2010
    BibTeX
    @standard{Adobe2010,
     author = {Adobe},
     title = {XMP Specification Part 1 Data Model, Serialization, and Core Properties},
     year = {2010}}
    
  2. Adobe
    XMP Specification Part 2 Additional Properties
    Adobe, 2010
    BibTeX
    @standard{Adobe2010a,
     author = {Adobe},
     title = {XMP Specification Part 2 Additional Properties},
     year = {2010}}
    
  3. Adobe
    XMP Specification Part 3 Storage in Files
    Adobe, 2010
    BibTeX
    @standard{Adobe2010b,
     author = {Adobe},
     title = {XMP Specification Part 3 Storage in Files},
     year = {2010}}
    
  4. I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo & G. Serra
    Geometric tampering estimation by means of a sift-based forensic analysis
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    International Conference on Acoustics, Speech, and Signal Processing, 2010
    BibTeX
    @inproceedings{Amerini2010,
     author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Bimbo, Alberto Del and Serra, Giuseppe},
     title = {Geometric tampering estimation by means of a sift-based forensic analysis},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     journal = {International Conference on Acoustics, Speech, and Signal Processing},
     year = {2010}}
    
  5. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo & G. Serra
    Geometric tampering estimation by means of a SIFT-based forensic analysis
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1702-1705
    BibTeX
    @inproceedings{Amerini2010b,
     author = {Amerini, I. and Ballan, L. and Caldelli, R. and Del Bimbo, A. and Serra, G. },
     title = {Geometric tampering estimation by means of a SIFT-based forensic analysis},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1702--1705}}
    
  6. E. Ardizzone, A. Bruno & G. Mazzola
    Detecting multiple copies in tampered images
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 2117-2120
    BibTeX
    @inproceedings{Ardizzone2010,
     author = {Ardizzone, E. and Bruno, A. and Mazzola, G.},
     title = {Detecting multiple copies in tampered images},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {2117--2120}}
    
  7. M. Barni, A. Costanzo & L. Sabatini
    Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Barni2010,
     author = {Barni, Mauro and Costanzo, Andrea and Sabatini, Lara},
     title = {Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  8. M. Bashar, K. Noda, N. Ohnishi & K. Mori
    Exploring Duplicated Regions in Natural Images
    IEEE Transactions on Image Processing, 2010, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Bashar2010,
     author = {Bashar, M. and Noda, K. and Ohnishi, N. and Mori, K.},
     title = {Exploring Duplicated Regions in Natural Images},
     journal = {IEEE Transactions on Image Processing},
     year = {2010},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  9. S. Battiato, G. Messina & D. Strano
    Chain of evidence generation for contrast enhancement in digital image forensics
    Creutzburg, R. & Akopian, D. (ed.)
    Proc. SPIE 7542
    Multimedia on Mobile Devices 2010, SPIE, 2010, Vol. 7542(1), pp. 75420E
    BibTeX
    @conference{Battiato2010,
     author = {Sebastiano Battiato and Giuseppe Messina and Daniela Strano},
     title = {Chain of evidence generation for contrast enhancement in digital image forensics},
     booktitle = {Proc. SPIE 7542},
     journal = {Multimedia on Mobile Devices 2010},
     publisher = {SPIE},
     year = {2010},
     volume = {7542},
     number = {1},
     pages = {75420E}}
    
  10. S. Bayram, H.T. Sencar & N. Memon
    Efficient techniques for sensor fingerprint matching in large image and video databases
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754109
    BibTeX
    @inproceedings{Bayram2010,
     author = {Sevinc Bayram and H. Taha Sencar and Nasir Memon},
     title = {Efficient techniques for sensor fingerprint matching in large image and video databases},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754109}}
    
  11. J. Bijhold, A. Ruifrok & Z.J. Geradts
    Forensic visual evidence 2007-2010: A Review
    Proceeding of the 16th INTERPOL Forensic Science Symposium, Lyon, France, October 2010
    2010
    BibTeX
    @conference{Bijhold2010,
     author = {Bijhold, J. and Ruifrok, A. and Geradts, Z. J.},
     title = {Forensic visual evidence 2007-2010: A Review},
     booktitle = {Proceeding of the 16th INTERPOL Forensic Science Symposium, Lyon, France, October 2010},
     year = {2010}}
    
  12. X. Bo, W. Junwen, L. Guangjie & D. Yuewei
    Image Copy-Move Forgery Detection Based on SURF
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 889-892
    BibTeX
    @inproceedings{Bo2010,
     author = {Xu Bo and Wang Junwen and Liu Guangjie and Dai Yuewei},
     title = {Image Copy-Move Forgery Detection Based on SURF},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {889--892}}
    
  13. R.A.G.D.B.S.R.R. Bosco, A.; Bruna
    Signal-dependent raw image denoising using sensor noise characterization via multiple acquisitions
    Imai, Francisco; Sampat, N. X. F. (ed.)
    Digital Photography VI
    2010, Vol. Proceedings of the SPIE, Volume 7537
    BibTeX
    @inproceedings{Bosco2010,
     author = {Bosco, A.; Bruna, R. A.; Giacalone, D.; Battiato, S.; Rizzo, R.},
     title = {Signal-dependent raw image denoising using sensor noise characterization via multiple acquisitions},
     booktitle = {Digital Photography VI},
     year = {2010},
     volume = {Proceedings of the SPIE, Volume 7537}}
    
  14. K. Cai, X. Li, B. Yang & X. Lu
    Blind Tampering Identification by Incorporating EFR and Calibration
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 379-383
    BibTeX
    @inproceedings{Cai2010,
     author = {Kaiwei Cai and Xiaolong Li and Bin Yang and Xiaoqing Lu},
     title = {Blind Tampering Identification by Incorporating EFR and Calibration},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {379--383}}
    
  15. R. Caldelli, I. Amerini & F. Picchioni
    A DFT-Based Analysis to Discern Between Camera and Scanned Images
    International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(1), pp. 21-29
    BibTeX
    @article{Caldelli2010,
     author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco},
     title = {A DFT-Based Analysis to Discern Between Camera and Scanned Images},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2010},
     volume = {2},
     number = {1},
     pages = {21-29}}
    
  16. R. Caldelli, I. Amerini, F. Picchioni, A.D. Rosa & F. Uccheddu
    Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
    Klinger, K. (ed.)
    Chapter Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication (Chapter 6)
    Information Science Reference, 2010, pp. 130-154
    BibTeX
    @inbook{Caldelli2010a,
     author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco and Rosa, Alessia De and Uccheddu, Francesca},
     title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions},
     publisher = {Information Science Reference},
     year = {2010},
     pages = {130-154}}
    
  17. G. Cao, Y. Zhao & R. Ni
    Edge-based Blur Metric for Tamper Detection
    Journal of Information Hiding and Multimedia Signal Processing, 2010, Vol. 1(1), pp. 20-27
    BibTeX
    @article{Cao2010,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong},
     title = {Edge-based Blur Metric for Tamper Detection},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2010},
     volume = {1},
     number = {1},
     pages = {20-27}}
    
  18. G. Cao, Y. Zhao & R. Ni
    Forensic Estimation of Gamma Correction in Digital Images
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Cao2010d,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong},
     title = {Forensic Estimation of Gamma Correction in Digital Images},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  19. G. Cao, Y. Zhao, R. Ni & H. Tian
    Anti-forensics of contrast enhancement in digital images
    Proceedings of the 12th ACM workshop on Multimedia and security
    ACM, 2010, pp. 25-34
    BibTeX
    @inproceedings{Cao2010b,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Tian, Huawei},
     title = {Anti-forensics of contrast enhancement in digital images},
     booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2010},
     pages = {25--34}}
    
  20. G. Cao, Y. Zhao, R. Ni, L. Yu & H. Tian
    Forensic Detection of Median Filtering in Digital Images
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Cao2010e,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Yu, Lifang and Tian, Huawei},
     title = {Forensic Detection of Median Filtering in Digital Images},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  21. H. Cao & A.C. Kot
    Identification of recaptured photographs on LCD screens
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1790-1793
    BibTeX
    @inproceedings{Cao2010a,
     author = {Cao, Hong and Kot, Alex C.},
     title = {Identification of recaptured photographs on LCD screens},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1790--1793}}
    
  22. H. Cao & A.C. Kot
    Mobile Camera Identification Using Demosaicing Features
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Cao2010c,
     author = {Cao, Hong and Kot, Alex C.},
     title = {Mobile Camera Identification Using Demosaicing Features},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  23. H. Cao & A.C. Kot
    Identification of recaptured photographs on LCD screens
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1790-1793
    BibTeX
    @inproceedings{Cao2010f,
     author = {Hong Cao and Alex C. Kot},
     title = {Identification of recaptured photographs on LCD screens},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1790--1793}}
    
  24. A. Caron, P. Jodoin & C. Charrier
    Search Strategies for Image Multi-distortion Estimation
    Proc. 20th Int Pattern Recognition (ICPR) Conf
    2010, pp. 2824-2827
    BibTeX
    @inproceedings{Caron2010,
     author = {Caron, A. and Jodoin, P. and Charrier, C. },
     title = {Search Strategies for Image Multi-distortion Estimation},
     booktitle = {Proc. 20th Int Pattern Recognition (ICPR) Conf},
     year = {2010},
     pages = {2824--2827}}
    
  25. A. Castiglione, G. Cattaneo, M. Cembalo & U.F. Petrillo
    Source Camera Identification in Real Practice: A Preliminary Experimentation
    Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)
    2010, pp. 417-422
    BibTeX
    @inproceedings{Castiglione2010,
     author = {Castiglione, A. and Cattaneo, G. and Cembalo, M. and Petrillo, U. F.},
     title = {Source Camera Identification in Real Practice: A Preliminary Experimentation},
     booktitle = {Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)},
     year = {2010},
     pages = {417--422}}
    
  26. H. Chen, G. Grider, C. Scott, M. Turley, A. Torres, K. Sanchez & J. Bremer
    Integration Experiences and Performance Studies of A COTS Parallel Archive System
    Cluster Computing (CLUSTER), 2010 IEEE International Conference on
    2010, pp. 166-177
    BibTeX
    @inproceedings{Chen2010a,
     author = {Chen, H. and Grider, G. and Scott, C. and Turley, M. and Torres, A. and Sanchez, K. and Bremer, J.},
     title = {Integration Experiences and Performance Studies of A COTS Parallel Archive System},
     booktitle = {Cluster Computing (CLUSTER), 2010 IEEE International Conference on},
     year = {2010},
     pages = {166--177}}
    
  27. H. Chen, X. Shen & Y. Lv
    Blind Identification Method for Authenticity of Infinite Light Source Images
    Proc. Fifth Int Frontier of Computer Science and Technology (FCST) Conf
    2010, pp. 131-135
    BibTeX
    @inproceedings{Chen2010,
     author = {Haipeng Chen and Xuanjing Shen and Yingda Lv},
     title = {Blind Identification Method for Authenticity of Infinite Light Source Images},
     booktitle = {Proc. Fifth Int Frontier of Computer Science and Technology (FCST) Conf},
     year = {2010},
     pages = {131--135}}
    
  28. H.R. Chennamma & L. Rangarajan
    Source Camera Identification Based on Sensor Readout Noise
    International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(3), pp. 28-43
    BibTeX
    @article{Chennamma2010,
     author = {H. R. Chennamma and Lalitha Rangarajan},
     title = {Source Camera Identification Based on Sensor Readout Noise},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2010},
     volume = {2},
     number = {3},
     pages = {28-43}}
    
  29. G. Chetty
    Blind and passive digital video tamper detection based on multimodal fusion
    Proceedings of the 14th WSEAS international conference on Communications
    World Scientific and Engineering Academy and Society (WSEAS), 2010, pp. 109-117
    BibTeX
    @inproceedings{Chetty2010a,
     author = {Chetty, Girija},
     title = {Blind and passive digital video tamper detection based on multimodal fusion},
     booktitle = {Proceedings of the 14th WSEAS international conference on Communications},
     publisher = {World Scientific and Engineering Academy and Society (WSEAS)},
     year = {2010},
     pages = {109--117}}
    
  30. G. Chetty
    Nonintrusive Image Tamper Detection Based on Fuzzy Fusion
    Journal of Computer Science and Network Security, 2010, Vol. 10(9), pp. 86-90
    BibTeX
    @article{Chetty2010b,
     author = {Chetty, Girija},
     title = {Nonintrusive Image Tamper Detection Based on Fuzzy Fusion},
     journal = {Journal of Computer Science and Network Security},
     year = {2010},
     volume = {10},
     number = {9},
     pages = {86-90}}
    
  31. G. Chetty, M. Biswas & R. Singh
    Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features
    Proc. 4th Int Network and System Security (NSS) Conf
    2010, pp. 606-613
    BibTeX
    @inproceedings{Chetty2010d,
     author = {Chetty, G. and Biswas, M. and Singh, R. },
     title = {Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features},
     booktitle = {Proc. 4th Int Network and System Security (NSS) Conf},
     year = {2010},
     pages = {606--613}}
    
  32. G. Chetty, J. Goodwin & M. Singh
    Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features
    Blanc-Talon, J., Bone, D., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Springer Berlin / Heidelberg, 2010, Vol. 6475, pp. 79-87
    BibTeX
    @incollection{Chetty2010c,
     author = {Chetty, Girija and Goodwin, Julian and Singh, Monica},
     title = {Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer Berlin / Heidelberg},
     year = {2010},
     volume = {6475},
     pages = {79-87}}
    
  33. G. Chetty, M. Singh & M. White
    Blind Image Tamper Detection Based on Multimodal Fusion
    Wong, K., Mendis, B. & Bouzerdoum, A. (ed.)
    Neural Information Processing. Models and Applications
    Springer Berlin / Heidelberg, 2010, Vol. 6444, pp. 557-564
    BibTeX
    @incollection{Chetty2010,
     author = {Chetty, Girija and Singh, Monica and White, Matthew},
     title = {Blind Image Tamper Detection Based on Multimodal Fusion},
     booktitle = {Neural Information Processing. Models and Applications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2010},
     volume = {6444},
     pages = {557-564}}
    
  34. Chiang, Khanna, Mikkilineni, Segovia, Chiu & E.J. Delp
    Intelligent Multimedia Analysis for Security Applications
    Husrev T. Sencar, Sergio Velastin, N. N. S. L. (ed.)
    Chapter Printer and Scanner Forensics: Models and Methods
    Springer Berlin / Heidelberg, 2010, pp. 145-187
    BibTeX
    @inbook{Chiang2010,
     author = {Chiang and Khanna and Mikkilineni and Segovia and Chiu and Delp, E. J.},
     title = {Intelligent Multimedia Analysis for Security Applications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2010},
     pages = {145-187}}
    
  35. P.-J. Chiang, N. Khanna, A.K. Mikkilineni, M.V.O. Segovia, J.P. Allebach, G.T.C. Chiu & E.J. Delp
    Studies in Computational Intelligence
    Chapter Printer and Scanner Forensics: Models and Methods
    Springer, 2010, pp. 145-187
    BibTeX
    @inbook{Chiang2010a,
     author = {Pei-Ju Chiang and Nitin Khanna and Aravind K. Mikkilineni and Maria V. Ortiz Segovia and Jan P. Allebach and George T. C. Chiu and Edward J. Delp},
     title = {Studies in Computational Intelligence},
     publisher = {Springer},
     year = {2010},
     pages = {145-187}}
    
  36. G. Chierchia, S. Parrilli, G. Poggi, C. Sansone & L. Verdoliva
    On the influence of denoising in PRNU based forgery detection
    Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
    ACM, 2010, pp. 117-122
    BibTeX
    @inproceedings{Chierchia:2010:IDP:1877972.1878002,
     author = {Chierchia, Giovanni and Parrilli, Sara and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {On the influence of denoising in PRNU based forgery detection},
     booktitle = {Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence},
     publisher = {ACM},
     year = {2010},
     pages = {117--122}}
    
  37. C.-H. Choi, M.-J. Lee & H.-K. Lee
    Scanner Identification Using Spectral Noise in the Frequency Domain
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Choi2010,
     author = {Choi, Chang-Hee and Lee, Min-Jeong and Lee, Heung-Kyu},
     title = {Scanner Identification Using Spectral Noise in the Frequency Domain},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  38. V. Christlein, C. Riess & E. Angelopoulou
    A Study on Features for the Detection of Copy-Move Forgeries
    Information Security Solutions Europe
    2010
    BibTeX
    @inproceedings{Christlein2010,
     author = {Christlein, Vincent and Riess, Christian and Angelopoulou, Elli},
     title = {A Study on Features for the Detection of Copy-Move Forgeries},
     booktitle = {Information Security Solutions Europe},
     year = {2010}}
    
  39. V. Christlein, C. Riess & E. Angelopoulou
    On rotation invariance in copy-move forgery detection
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2010, pp. 1-6
    BibTeX
    @inproceedings{Christlein2010a,
     author = {Christlein, V. and Riess, C. and Angelopoulou, E.},
     title = {On rotation invariance in copy-move forgery detection},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2010},
     pages = {1--6}}
    
  40. W.-H. Chuang & M. Wu
    Semi non-intrusive training for cell-phone camera model linkage
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2010, pp. 1-6
    BibTeX
    @inproceedings{Chuang2010,
     author = {Wei-Hong Chuang and Min Wu},
     title = {Semi non-intrusive training for cell-phone camera model linkage},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2010},
     pages = {1--6}}
    
  41. S.-W. Chung, B.-K. Kim & W.-J. Song
    Removing chromatic aberration by digital image processing
    Optical Engineering, SPIE, 2010, Vol. 49(6), pp. 067002
    BibTeX
    @article{Chung2010,
     author = {Soon-Wook Chung and Byoung-Kwang Kim and Woo-Jin Song},
     title = {Removing chromatic aberration by digital image processing},
     journal = {Optical Engineering},
     publisher = {SPIE},
     year = {2010},
     volume = {49},
     number = {6},
     pages = {067002}}
    
  42. CIPA
    Exchangable image file format dor digital still cameras: EXIF Version 2.3
    CIPA, 2010
    BibTeX
    @standard{CIPA2010,
     author = {CIPA},
     title = {Exchangable image file format dor digital still cameras: EXIF Version 2.3},
     year = {2010}}
    
  43. P. Comon & C. Jutten
    Handbook of Blind Source Separation: Independent Component Analysis and Applications
    Academic Press, 2010
    BibTeX
    @book{Comon2010,
     author = {Comon, Pierre and Jutten, Christian},
     title = {Handbook of Blind Source Separation: Independent Component Analysis and Applications},
     publisher = {Academic Press},
     year = {2010}}
    
  44. V. Conotter, G. Boato & H. Farid
    Detecting Photo Manipulation on Signs and Billboards
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Conotter2010,
     author = {Conotter, Valentina and Boato, Giulia and Farid, Hany},
     title = {Detecting Photo Manipulation on Signs and Billboards},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  45. D. Cromey
    Avoiding Twisted Pixels: Ethical Guidelines for the Appropriate Use and Manipulation of Scientific Digital Images
    Science and Engineering Ethics, Springer Netherlands, 2010, Vol. 16, pp. 639-667
    BibTeX
    @article{Cromey2010,
     author = {Cromey, Douglas},
     title = {Avoiding Twisted Pixels: Ethical Guidelines for the Appropriate Use and Manipulation of Scientific Digital Images},
     journal = {Science and Engineering Ethics},
     publisher = {Springer Netherlands},
     year = {2010},
     volume = {16},
     pages = {639-667}}
    
  46. Y. Dai, H. Xiang, P. Lu & W. Feng
    Image splicing detection based on estimation of camera intrinsic parameters
    Proc. Int Audio Language and Image Processing (ICALIP) Conf
    2010, pp. 214-218
    BibTeX
    @inproceedings{Dai2010,
     author = {Yanfei Dai and Hui Xiang and Peng Lu and Wenjuan Feng},
     title = {Image splicing detection based on estimation of camera intrinsic parameters},
     booktitle = {Proc. Int Audio Language and Image Processing (ICALIP) Conf},
     year = {2010},
     pages = {214--218}}
    
  47. Z. Daixian
    SIFT algorithm analysis and optimization
    Proc. Int Image Analysis and Signal Processing (IASP) Conf
    2010, pp. 415-419
    BibTeX
    @inproceedings{Daixian2010,
     author = {Zhu Daixian},
     title = {SIFT algorithm analysis and optimization},
     booktitle = {Proc. Int Image Analysis and Signal Processing (IASP) Conf},
     year = {2010},
     pages = {415--419}}
    
  48. N. Dalgaard, C. Mosquera & F. Perez-Gonzalez
    On the Role of Differentiation for Resampling Detection
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Dalgaard2010,
     author = {Dalgaard, Nahuel and Mosquera, Carlos and Perez-Gonzalez, Fernando},
     title = {On the Role of Differentiation for Resampling Detection},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  49. F. De Simone, L. Goldmann, D. Filimonov & T. Ebrahimi
    On the Limits of Perceptually Optimized JPEG
    Multimedia Signal Processing Group (MMSPG) Ecole Polytechnique F´ed´erale de Lausanne (EPFL) CH-1015 Lausanne, Switzerland, 2010
    BibTeX
    @techreport{DeSimone2010,
     author = {De Simone, Francesca and Goldmann, Lutz and Filimonov, Denis and Ebrahimi, Touradj},
     title = {On the Limits of Perceptually Optimized JPEG},
     year = {2010}}
    
  50. V.G. Edupuganti & F.Y. Shih
    Authentication of JPEG Images Based on Genetic Algorithms
    The Open Artificial Intelligence Journal, 2010, Vol. 4, pp. 30-36
    BibTeX
    @article{Edupuganti2010,
     author = {Edupuganti, Venkata Gopal and Shih, Frank. Y},
     title = {Authentication of JPEG Images Based on Genetic Algorithms},
     journal = {The Open Artificial Intelligence Journal},
     year = {2010},
     volume = {4},
     pages = {30-36}}
    
  51. Z. Fang, S. Wang & X. Zhang
    Image Splicing Detection Using Color Edge Inconsistency
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 923-926
    BibTeX
    @inproceedings{Fang2010,
     author = {Zhen Fang and Shuozhong Wang and Xinpeng Zhang},
     title = {Image Splicing Detection Using Color Edge Inconsistency},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {923--926}}
    
  52. H. Farid
    A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo
    Department of Computer Science, Dartmouth College, 2010(TR2010-669)
    BibTeX
    @techreport{Farid2010a,
     author = {Farid, Hany},
     title = {A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo},
     year = {2010},
     number = {TR2010-669}}
    
  53. H. Farid & M.J. Bravo
    Image forensic analyses that elude the human visual system
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754106
    BibTeX
    @inproceedings{Farid2010,
     author = {Hany Farid and Mary J. Bravo},
     title = {Image forensic analyses that elude the human visual system},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754106}}
    
  54. X. Feng & G. Doërr
    JPEG recompression detection
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410J
    BibTeX
    @inproceedings{Feng2010,
     author = {Feng, Xiaoying and Doërr, Gwenaël},
     title = {JPEG recompression detection},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410J}}
    
  55. C. Fillion & G. Sharma
    Detecting content adaptive scaling of images for forensic applications
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410Z
    BibTeX
    @inproceedings{Fillion2010,
     author = {Claude Fillion and Gaurav Sharma},
     title = {Detecting content adaptive scaling of images for forensic applications},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410Z}}
    
  56. D. Flemström & M. Roth
    Die digitale Erkennung von Bildbearbeitung
    Deutsche Schule Stockholm Karlavägen 25 11431 Stockholm SCHWEDEN, 2010
    BibTeX
    @techreport{Flemstroem2010,
     author = {David Flemström and Moritz Roth},
     title = {Die digitale Erkennung von Bildbearbeitung},
     year = {2010}}
    
  57. A. Flores & S. Belongie
    Removing pedestrians from Google street view images
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2010, pp. 53-58
    BibTeX
    @inproceedings{Flores2010,
     author = {Flores, Arturo and Belongie, Serge},
     title = {Removing pedestrians from Google street view images},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2010},
     pages = {53--58}}
    
  58. G. Friedland, O. Vinyals & T. Darrell
    Multimodal location estimation
    Proceedings of the international conference on Multimedia
    ACM, 2010, pp. 1245-1252
    BibTeX
    @inproceedings{Friedland2010,
     author = {Friedland, Gerald and Vinyals, Oriol and Darrell, Trevor},
     title = {Multimodal location estimation},
     booktitle = {Proceedings of the international conference on Multimedia},
     publisher = {ACM},
     year = {2010},
     pages = {1245--1252}}
    
  59. X. Gao, T.-T. Ng, B. Qiu & S.-F. Chang
    Single-View Recaptured Image Detection Based on Physics-Based Features
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Gao2010,
     author = {Gao, Xinting and Ng, Tian-Tsong and Qiu, Bo and Chang, Shih-Fu},
     title = {Single-View Recaptured Image Detection Based on Physics-Based Features},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  60. D. Garcia-Romero & C. Espy-Wilson
    Automatic Acquisition Device Identification from Speech Recordings
    International Conference on Acoustics, Speech, and Signal Processing
    2010, pp. 1806-1809
    BibTeX
    @inproceedings{Garcia-Romero2010,
     author = {Garcia-Romero, Daniel and Espy-Wilson, Carol},
     title = {Automatic Acquisition Device Identification from Speech Recordings},
     booktitle = {International Conference on Acoustics, Speech, and Signal Processing},
     year = {2010},
     pages = {1806-1809}}
    
  61. F. Gharibi, F. Akhlaghian, J. RavanJamjah & B. ZahirAzami
    Using the local information of image to identify the source camera
    Proc. IEEE Int Signal Processing and Information Technology (ISSPIT) Symp
    2010, pp. 515-519
    BibTeX
    @inproceedings{Gharibi2010,
     author = {Gharibi, F. and Akhlaghian, F. and RavanJamjah, J. and ZahirAzami, B. },
     title = {Using the local information of image to identify the source camera},
     booktitle = {Proc. IEEE Int Signal Processing and Information Technology (ISSPIT) Symp},
     year = {2010},
     pages = {515--519}}
    
  62. T. Gloe & R. Böhme
    The ´Dresden Image Database´ for benchmarking digital image forensics
    SAC ´10: Proceedings of the 2010 ACM Symposium on Applied Computing
    ACM, 2010, pp. 1584-1590
    BibTeX
    @inproceedings{Gloe2010a,
     author = {Gloe, Thomas and Böhme, Rainer},
     title = {The ´Dresden Image Database´ for benchmarking digital image forensics},
     booktitle = {SAC ´10: Proceedings of the 2010 ACM Symposium on Applied Computing},
     publisher = {ACM},
     year = {2010},
     pages = {1584--1590}}
    
  63. T. Gloe, K. Borowka & A. Winkler
    Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754107
    BibTeX
    @inproceedings{Gloe2010,
     author = {Thomas Gloe and Karsten Borowka and Antje Winkler},
     title = {Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754107}}
    
  64. M. Goljan, J. Fridrich & M. Chen
    Sensor noise camera identification: countering counter-forensics
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410S
    BibTeX
    @inproceedings{Goljan2010a,
     author = {Miroslav Goljan and Jessica Fridrich and Mo Chen},
     title = {Sensor noise camera identification: countering counter-forensics},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410S}}
    
  65. M. Goljan, J. Fridrich & T. Filler
    Managing a large database of camera fingerprints
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754108
    BibTeX
    @inproceedings{Goljan2010,
     author = {Miroslav Goljan and Jessica Fridrich and Filler, Tomáš},
     title = {Managing a large database of camera fingerprints},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754108}}
    
  66. R.E.J. Granty, T.S. Aditya & S.S. Madhu
    Survey on passive methods of image tampering detection
    Proc. Int Communication and Computational Intelligence (INCOCCI) Conf
    2010, pp. 431-436
    BibTeX
    @inproceedings{Granty2010,
     author = {Granty, R. E. J. and Aditya, T. S. and Madhu, S. S. },
     title = {Survey on passive methods of image tampering detection},
     booktitle = {Proc. Int Communication and Computational Intelligence (INCOCCI) Conf},
     year = {2010},
     pages = {431--436}}
    
  67. U. Greveler & D. Löhr
    Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern
    Proceedings of D•A•CH Security 2010
    2010
    BibTeX
    @inproceedings{Greveler2010,
     author = {Ulrich Greveler and Dennis Löhr},
     title = {Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern},
     booktitle = {Proceedings of D•A•CH Security 2010},
     year = {2010}}
    
  68. J. Grim, P. Somol & P. Pudil
    Digital Image Forgery Detection by Local Statistical Models
    International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    2010, pp. 579-582
    BibTeX
    @inproceedings{Grim2010,
     author = {Grim, Jiri and Somol, Petr and Pudil, Pavel},
     title = {Digital Image Forgery Detection by Local Statistical Models},
     booktitle = {International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
     year = {2010},
     pages = {579-582}}
    
  69. G. Gul, I. Avcibas & F. Kurugollu
    SVD based image manipulation detection
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 1765-1768
    BibTeX
    @inproceedings{Gul2010,
     author = {Gul, Gokhan and Avcibas, Ismail and Kurugollu, Fatih},
     title = {SVD based image manipulation detection},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {1765--1768}}
    
  70. S. Hamdy, H. El-Messiry, M. Roushdy & E. Kahlifa
    Retrieval of Bitmap Compression History
    International Journal of Computer Science and Information Security, 2010, Vol. 8, pp. 141-146
    BibTeX
    @article{Hamdy2010,
     author = {Salma Hamdy and Haytham El-Messiry and Mohamed Roushdy and Essam Kahlifa},
     title = {Retrieval of Bitmap Compression History},
     journal = {International Journal of Computer Science and Information Security},
     year = {2010},
     volume = {8},
     pages = {141-146}}
    
  71. S. Hamdy, H. El-Messiry, M. Roushdy & E. Kahlifa
    Quantization Table Estimation in JPEG Images
    International Journal of Advanced Computer Sciences and Applications, 2010, Vol. 1, pp. 17-23
    BibTeX
    @article{Hamdy2010a,
     author = {Salma Hamdy and Haytham El-Messiry and Mohamed Roushdy and Essam Kahlifa},
     title = {Quantization Table Estimation in JPEG Images},
     journal = {International Journal of Advanced Computer Sciences and Applications},
     year = {2010},
     volume = {1},
     pages = {17-23}}
    
  72. J. Hanjun & S. Huali
    Rendering fake soft shadows based on the erosion and dilation
    Proc. 2nd Int Computer Engineering and Technology (ICCET) Conf
    2010, Vol. 6
    BibTeX
    @inproceedings{Hanjun2010,
     author = {Jin Hanjun and Sun Huali},
     title = {Rendering fake soft shadows based on the erosion and dilation},
     booktitle = {Proc. 2nd Int Computer Engineering and Technology (ICCET) Conf},
     year = {2010},
     volume = {6}}
    
  73. J. Ho, O.C. Au & J. Zhou
    Inter-Channel Demosaicking Traces for Digital Image Forensics
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Ho2010,
     author = {Ho, John and Au, Oscar C. and Zhou, Jiantao},
     title = {Inter-Channel Demosaicking Traces for Digital Image Forensics},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  74. Y.F. Hsu & S.F. Chang
    Camera Response Functions For Image Forensics: An Automatic Algorithm for Splicing Detection
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(5), pp. 1
    BibTeX
    @article{Hsu2010,
     author = {Hsu, Y. F. and Chang, S. F.},
     title = {Camera Response Functions For Image Forensics: An Automatic Algorithm for Splicing Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {5},
     pages = {1}}
    
  75. Y. Hu, C. Jian & C.-T. Li
    Using improved imaging sensor pattern noise for source camera identification
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2010, pp. 1481-1486
    BibTeX
    @inproceedings{Hu2010b,
     author = {Yongjian Hu and Chao Jian and Chang-Tsun Li},
     title = {Using improved imaging sensor pattern noise for source camera identification},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2010},
     pages = {1481--1486}}
    
  76. Y. Hu, C.-T. Li & C. Jian
    Building fingerprints with information from three color bands for source camera identification
    Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
    ACM, 2010, pp. 111-116
    BibTeX
    @inproceedings{Hu2010a,
     author = {Hu, Yongjian and Li, Chang-Tsun and Jian, Chao},
     title = {Building fingerprints with information from three color bands for source camera identification},
     booktitle = {Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence},
     publisher = {ACM},
     year = {2010},
     pages = {111--116}}
    
  77. Y. Hu, C.-T. Li & C. Zhou
    Selecting forensic features for robust source camera identification
    Proc. Int. Computer Symp. (ICS)
    2010, pp. 506-511
    BibTeX
    @inproceedings{Hu2010,
     author = {Yongjian Hu and Chang-Tsun Li and Changhui Zhou},
     title = {Selecting forensic features for robust source camera identification},
     booktitle = {Proc. Int. Computer Symp. (ICS)},
     year = {2010},
     pages = {506--511}}
    
  78. F. Huang, J. Huang & Y.Q. Shi
    Detecting Double JPEG Compression With the Same Quantization Matrix
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 848-856
    BibTeX
    @article{Huang2010a,
     author = {Fangjun Huang and Jiwu Huang and Yun Qing Shi},
     title = {Detecting Double JPEG Compression With the Same Quantization Matrix},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {4},
     pages = {848--856}}
    
  79. H. Huang, G. Coatrieux, H.Z. Shu, L.M. Luo & C. Roux
    Medical image tamper approximation based on an image moment signature
    Proc. 12th IEEE Int e-Health Networking Applications and Services (Healthcom) Conf
    2010, pp. 254-259
    BibTeX
    @inproceedings{Huang2010b,
     author = {Huang, H. and Coatrieux, G. and Shu, H. Z. and Luo, L. M. and Roux, C.},
     title = {Medical image tamper approximation based on an image moment signature},
     booktitle = {Proc. 12th IEEE Int e-Health Networking Applications and Services (Healthcom) Conf},
     year = {2010},
     pages = {254--259}}
    
  80. Y. Huang & N. Fang
    Learning from Interpolated Images using Neural Networks for Digital Forensics
    Computer Sciences Department University of Wisconsin-Madison, 2010
    BibTeX
    @techreport{Huang2010,
     author = {Huang, Y. and Fang, N.},
     title = {Learning from Interpolated Images using Neural Networks for Digital Forensics},
     year = {2010}}
    
  81. IPTC
    IPTC Standard Photo Metadata IPTC Core Specification Version 1.1 IPTC Extension Specification Version 1.1
    IPTC, 2010
    BibTeX
    @standard{IPTC2010,
     author = {IPTC},
     title = {IPTC Standard Photo Metadata IPTC Core Specification Version 1.1 IPTC Extension Specification Version 1.1},
     year = {2010}}
    
  82. B. Jajal & V. Desai
    Identification of copy--paste regions in digital image
    International Journal of Imaging Systems and Technology, 2010, Vol. 20(4), pp. 367-369
    BibTeX
    @article{Jajal2010,
     author = {Brijesh Jajal and Vipul Desai},
     title = {Identification of copy--paste regions in digital image},
     journal = {International Journal of Imaging Systems and Technology},
     year = {2010},
     volume = {20},
     number = {4},
     pages = {367--369}}
    
  83. W. Jiang, A. Ho, H. Treharne & Y. Shi
    A Novel Multi-size Block Benford’s Law Scheme for Printer Identification
    Qiu, G., Lam, K., Kiya, H., Xue, X.-Y., Kuo, C.-C. & Lew, M. (ed.)
    Advances in Multimedia Information Processing - PCM 2010
    Springer Berlin Heidelberg, 2010, Vol. 6297, pp. 643-652
    BibTeX
    @incollection{Jiang2010,
     author = {Jiang, Weina and Ho, AnthonyT.S. and Treharne, Helen and Shi, YunQ.},
     title = {A Novel Multi-size Block Benford’s Law Scheme for Printer Identification},
     booktitle = {Advances in Multimedia Information Processing - PCM 2010},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     volume = {6297},
     pages = {643-652}}
    
  84. X. Jin
    Artificial Joint Surface Fitting Based on Moving Least Squares Methods
    Proc. Int Internet Technology and Applications Conf
    2010, pp. 1-4
    BibTeX
    @inproceedings{Jin2010,
     author = {Xiangyang Jin},
     title = {Artificial Joint Surface Fitting Based on Moving Least Squares Methods},
     booktitle = {Proc. Int Internet Technology and Applications Conf},
     year = {2010},
     pages = {1--4}}
    
  85. T. Jing, X. Li & F. Zhang
    Image tamper detection algorithm based on Radon and Fourier-Mellin transform
    Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
    2010, pp. 212-215
    BibTeX
    @inproceedings{Jing2010,
     author = {Tao Jing and Xinghua Li and Feifei Zhang},
     title = {Image tamper detection algorithm based on Radon and Fourier-Mellin transform},
     booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf},
     year = {2010},
     pages = {212--215}}
    
  86. I.N. Junejo & H. Foroosh
    GPS coordinates estimation and camera calibration from solar shadows
    Computer Vision and Image Understanding, 2010, Vol. 114(9), pp. 991 - 1003
    BibTeX
    @article{Junejo2010,
     author = {Junejo, Imran N. and Foroosh, Hassan},
     title = {GPS coordinates estimation and camera calibration from solar shadows},
     journal = {Computer Vision and Image Understanding},
     year = {2010},
     volume = {114},
     number = {9},
     pages = {991 - 1003}}
    
  87. Z. Junhong
    Detection of Copy-Move Forgery based on one improved LLE method
    Proc. 2nd Int Advanced Computer Control (ICACC) Conf
    2010, Vol. 4, pp. 547-550
    BibTeX
    @inproceedings{Junhong2010,
     author = {Zhao Junhong},
     title = {Detection of Copy-Move Forgery based on one improved LLE method},
     booktitle = {Proc. 2nd Int Advanced Computer Control (ICACC) Conf},
     year = {2010},
     volume = {4},
     pages = {547--550}}
    
  88. P. Kakar, S. Natarajan & W. Ser
    Detecting Digital Image Forgeries Through Inconsistent Motion Blur
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Kakar2010,
     author = {Kakar, Pravin and Natarajan, Sudha and Ser, Wee},
     title = {Detecting Digital Image Forgeries Through Inconsistent Motion Blur},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  89. P. Kakar, S. Natarajan & W. Ser
    Image authentication by motion blur consistency verification
    TENCON 2010 - 2010 IEEE Region 10 Conference
    2010, pp. 188-193
    BibTeX
    @inproceedings{Kakar2010a,
     author = {Kakar, P. and Natarajan, S. and Wee Ser},
     title = {Image authentication by motion blur consistency verification},
     booktitle = {TENCON 2010 - 2010 IEEE Region 10 Conference},
     year = {2010},
     pages = {188--193}}
    
  90. L. Kang & X. ping Cheng
    Copy-move forgery detection in digital image
    Proc. 3rd Int Image and Signal Processing (CISP) Congress
    2010, Vol. 5, pp. 2419-2421
    BibTeX
    @inproceedings{Kang2010,
     author = {Li Kang and Xiao-ping Cheng},
     title = {Copy-move forgery detection in digital image},
     booktitle = {Proc. 3rd Int Image and Signal Processing (CISP) Congress},
     year = {2010},
     volume = {5},
     pages = {2419--2421}}
    
  91. E. Kee & H. Farid
    Digital image authentication from thumbnails
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410E
    BibTeX
    @inproceedings{Kee2010,
     author = {Kee, Eric and Farid, Hany},
     title = {Digital image authentication from thumbnails},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410E}}
    
  92. E. Kee & H. Farid
    Exposing Digital Forgeries from 3-D Lighting Environments
    IEEE International Workshop on Information Forensics and Security
    2010
    BibTeX
    @misc{Kee2010a,
     author = {Kee, Eric and Farid, Hany},
     title = {Exposing Digital Forgeries from 3-D Lighting Environments},
     booktitle = {IEEE International Workshop on Information Forensics and Security},
     year = {2010}}
    
  93. S. Khan & A. Kulkarni
    An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform.
    International Journal on Computer Science and Engineering, 2010, Vol. 2, pp. 1801-1806
    BibTeX
    @article{Khan2010,
     author = {Saiqa Khan and Arun Kulkarni},
     title = {An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform.},
     journal = {International Journal on Computer Science and Engineering},
     year = {2010},
     volume = {2},
     pages = {1801-1806}}
    
  94. S. Khan & A. Kulkarni
    Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
    International Journal of Computer Applications, 2010, Vol. 6, pp. 31-36
    BibTeX
    @article{Khan2010a,
     author = {Saiqa Khan and Arun Kulkarni},
     title = {Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform},
     journal = {International Journal of Computer Applications},
     year = {2010},
     volume = {6},
     pages = {31-36}}
    
  95. S. Khan & A. Kulkarni
    Robust method for detection of copy-move forgery in digital images
    Proc. Int Signal and Image Processing (ICSIP) Conf
    2010, pp. 69-73
    BibTeX
    @inproceedings{Khan2010b,
     author = {Khan, S. and Kulkarni, A. },
     title = {Robust method for detection of copy-move forgery in digital images},
     booktitle = {Proc. Int Signal and Image Processing (ICSIP) Conf},
     year = {2010},
     pages = {69--73}}
    
  96. N. Khanna & E.J. Delp
    Intrinsic Signatures for Scanned Documents Forensics : Effect of Font Shape and Size
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Khanna2010a,
     author = {Khanna, Nitin and Delp, Edward J.},
     title = {Intrinsic Signatures for Scanned Documents Forensics : Effect of Font Shape and Size},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  97. M. Kirchner
    Efficient estimation of CFA pattern configuration in digital camera images
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proc. SPIE
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754111
    BibTeX
    @conference{Kirchner2010,
     author = {Matthias Kirchner},
     title = {Efficient estimation of CFA pattern configuration in digital camera images},
     booktitle = {Proc. SPIE},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754111}}
    
  98. M. Kirchner
    Linear row and column predictors for the analysis of resized images
    Proceedings of the 12th ACM workshop on Multimedia and security
    ACM, 2010, pp. 13-18
    BibTeX
    @inproceedings{Kirchner2010a,
     author = {Kirchner, Matthias},
     title = {Linear row and column predictors for the analysis of resized images},
     booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2010},
     pages = {13--18}}
    
  99. M. Kirchner & J. Fridrich
    On detection of median filtering in digital images
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proc. SPIE
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754110
    BibTeX
    @conference{Kirchner2010b,
     author = {Matthias Kirchner and Jessica Fridrich},
     title = {On detection of median filtering in digital images},
     booktitle = {Proc. SPIE},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754110}}
    
  100. M. Kobayashi, T. Okabe & Y. Sato
    Detecting Forgery from Static-Scene Video Based on Inconsistency in Noise Level Functions
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 1
    BibTeX
    @article{Kobayashi2010,
     author = {Kobayashi, M. and Okabe, T. and Sato, Y.},
     title = {Detecting Forgery from Static-Scene Video Based on Inconsistency in Noise Level Functions},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {4},
     pages = {1}}
    
  101. J.-F. Lalonde, A. Efros & S. Narasimhan
    Detecting Ground Shadows in Outdoor Consumer Photographs
    Daniilidis, K., Maragos, P. & Paragios, N. (ed.)
    Computer Vision -- ECCV 2010
    Springer Berlin Heidelberg, 2010, Vol. 6312, pp. 322-335
    BibTeX
    @incollection{Lalonde2010,
     author = {Lalonde, Jean-François and Efros, AlexeiA. and Narasimhan, SrinivasaG.},
     title = {Detecting Ground Shadows in Outdoor Consumer Photographs},
     booktitle = {Computer Vision -- ECCV 2010},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     volume = {6312},
     pages = {322-335}}
    
  102. D. Langlois, S. Chartier & D. Gosselin
    An Introduction to Independent Component Analysis: InfoMax and FastICA algorithms
    Tutorials in Quantitative Methods for Psychology, 2010, Vol. 6(1), pp. 31-38
    BibTeX
    @article{Langlois2010,
     author = {Dominic Langlois and Sylvain Chartier and Dominique Gosselin},
     title = {An Introduction to Independent Component Analysis: InfoMax and FastICA algorithms},
     journal = {Tutorials in Quantitative Methods for Psychology},
     year = {2010},
     volume = {6(1)},
     pages = {31--38}}
    
  103. A.B. Lewis & M.G. Kuhn
    Exact JPEG recompression
    Visual Information Processing and Communication
    Visual Information Processing and Communication, SPIE, 2010, Vol. 7543(1), pp. 75430V
    BibTeX
    @conference{Lewis2010,
     author = {Andrew B. Lewis and Markus G. Kuhn},
     title = {Exact JPEG recompression},
     booktitle = {Visual Information Processing and Communication},
     journal = {Visual Information Processing and Communication},
     publisher = {SPIE},
     year = {2010},
     volume = {7543},
     number = {1},
     pages = {75430V}}
    
  104. C.-T. Li
    Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
    Klinger, K. (ed.)
    Hershey, New York, 2010
    BibTeX
    @book{Li2010c,
     author = {Chang-Tsun Li},
     title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions},
     publisher = {Hershey, New York},
     year = {2010}}
    
  105. C.-T. Li
    Source Camera Identification Using Enhanced Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(2), pp. 280-287
    BibTeX
    @article{Li2010,
     author = {Li, Chang-Tsun},
     title = {Source Camera Identification Using Enhanced Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {2},
     pages = {280-287}}
    
  106. C.-T. Li
    Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise
    IEEE International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Li2010b,
     author = {Li, Chang-Tsun},
     title = {Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise},
     booktitle = {IEEE International Symposium on Circuits and Systems},
     year = {2010}}
    
  107. C.-T. Li, C.-Y. Chang & Y. Li
    On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
    Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X. (S., Stan, M., Xiaohua, J., Zomaya, A., Coulson, G. & Weerasinghe, D. (ed.)
    Information Security and Digital Forensics
    Springer Berlin Heidelberg, 2010, Vol. 41, pp. 19-25
    BibTeX
    @incollection{Li2010e,
     author = {Li, Chang-Tsun and Chang, Chih-Yuan and Li, Yue},
     title = {On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise},
     booktitle = {Information Security and Digital Forensics},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     volume = {41},
     pages = {19-25}}
    
  108. C.-T. Li & Y. Li
    Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity Noise Pattern
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Li2010a,
     author = {Li, Chang-Tsun and Li, Yue},
     title = {Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity Noise Pattern},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  109. S. ping Li, Z. Han, Y. zhen Chen, B. Fu, C. Lu & X. Yao
    Resampling forgery detection in JPEG-compressed images
    Proc. 3rd Int Image and Signal Processing (CISP) Congress
    2010, Vol. 3, pp. 1166-1170
    BibTeX
    @inproceedings{Li2010g,
     author = {Shu-ping Li and Zhi Han and Yi-zhen Chen and Bo Fu and Chunhui Lu and Xiaohui Yao},
     title = {Resampling forgery detection in JPEG-compressed images},
     booktitle = {Proc. 3rd Int Image and Signal Processing (CISP) Congress},
     year = {2010},
     volume = {3},
     pages = {1166--1170}}
    
  110. W. Li & N. Yu
    Rotation Robust Detection of Copy-Move Forgery
    Image Processing (ICIP), 2010 17th IEEE International Conference on
    2010
    BibTeX
    @inproceedings{Li2010f,
     author = {Li, Weihai and Yu, Nenghai},
     title = {Rotation Robust Detection of Copy-Move Forgery},
     booktitle = {Image Processing (ICIP), 2010 17th IEEE International Conference on},
     year = {2010}}
    
  111. W. Li, N. Yu & Y. Yuan
    Identifying camera and processing from cropped JPEG photos via tensor analysis
    Proc. IEEE Int Systems Man and Cybernetics (SMC) Conf
    2010, pp. 3889-3895
    BibTeX
    @inproceedings{Li2010h,
     author = {Weihai Li and Nenghai Yu and Yuan Yuan},
     title = {Identifying camera and processing from cropped JPEG photos via tensor analysis},
     booktitle = {Proc. IEEE Int Systems Man and Cybernetics (SMC) Conf},
     year = {2010},
     pages = {3889--3895}}
    
  112. W. Li, T. Zhang, E. Zheng & X. Ping
    Identifying photorealistic computer graphics using second-order difference statistics
    Proc. Seventh Int Fuzzy Systems and Knowledge Discovery (FSKD) Conf
    2010, Vol. 5, pp. 2316-2319
    BibTeX
    @inproceedings{Li2010d,
     author = {Wenxiang Li and Tao Zhang and Ergong Zheng and Xijian Ping},
     title = {Identifying photorealistic computer graphics using second-order difference statistics},
     booktitle = {Proc. Seventh Int Fuzzy Systems and Knowledge Discovery (FSKD) Conf},
     year = {2010},
     volume = {5},
     pages = {2316--2319}}
    
  113. X. Li, T. Jing & X. Li
    Image splicing detection based on moment features and Hilbert-Huang Transform
    Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
    2010, pp. 1127-1130
    BibTeX
    @inproceedings{Li2010i,
     author = {Xuefang Li and Tao Jing and Xinghua Li},
     title = {Image splicing detection based on moment features and Hilbert-Huang Transform},
     booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf},
     year = {2010},
     pages = {1127--1130}}
    
  114. S. Lian & Y. Zhang
    Multimedia Forensics for Detecting Forgeries
    Stavroulakis, P. & Stamp, M. (ed.)
    Handbook of Information and Communication Security
    Springer Berlin Heidelberg, 2010, pp. 809-828
    BibTeX
    @incollection{Lian2010,
     author = {Lian, Shiguo and Zhang, Yan},
     title = {Multimedia Forensics for Detecting Forgeries},
     booktitle = {Handbook of Information and Communication Security},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     pages = {809-828}}
    
  115. C.-C. Lien, C.-L. Shih & C.-H. Chou
    Fast Forgery Detection with the Intrinsic Resampling Properties
    Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2010, pp. 232-235
    BibTeX
    @inproceedings{Lien2010,
     author = {Lien, Cheng-Chang and Shih, Cheng-Lun and Chou, Chih-Hsun},
     title = {Fast Forgery Detection with the Intrinsic Resampling Properties},
     booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2010},
     pages = {232--235}}
    
  116. G.-S. Lin, M.-K. Chang & Y. lin Chen
    A passive scheme for tampering detection based on quantization table estimation
    Frossard, P., Li, H., Wu, F., Girod, B., Li, S. & Wei, G. (ed.)
    Proceedings of SPIE
    Visual Communications and Image Processing 2010, SPIE, 2010, Vol. 7744(1), pp. 774433
    BibTeX
    @conference{Lin2010,
     author = {Guo-Shiang Lin and Min-Kuan Chang and You-lin Chen},
     title = {A passive scheme for tampering detection based on quantization table estimation},
     booktitle = {Proceedings of SPIE},
     journal = {Visual Communications and Image Processing 2010},
     publisher = {SPIE},
     year = {2010},
     volume = {7744},
     number = {1},
     pages = {774433}}
    
  117. B. bei Liu, H.-K. Lee, Y. Hu & C.-H. Choi
    On classification of source cameras: A graph based approach
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2010, pp. 1-5
    BibTeX
    @inproceedings{Liu2010c,
     author = {Bei-bei Liu and Heung-Kyu Lee and Yongjian Hu and Chang-Hee Choi},
     title = {On classification of source cameras: A graph based approach},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2010},
     pages = {1--5}}
    
  118. B.-B. Liu, Y. Hu & H.-K. Lee
    Source camera identification from significant noise residual regions
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 1749-1752
    BibTeX
    @inproceedings{Liu2010b,
     author = {Liu, Bei-Bei and Hu, Yongjian and Lee, Heung-Kyu},
     title = {Source camera identification from significant noise residual regions},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {1749--1752}}
    
  119. J. Liu, H. Ling, F. Zou, W. Yan & Z. Lu
    Digital Image Forensics Using Multi-Resolution Histograms
    International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(4), pp. 37-51
    BibTeX
    @article{Liu2010d,
     author = {Jin Liu and Hefei Ling and Fuhao Zou and WeiQi Yan and and Zhengding Lu},
     title = {Digital Image Forensics Using Multi-Resolution Histograms},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2010},
     volume = {2},
     number = {4},
     pages = {37-51}}
    
  120. C.R.W.L. Liu, L. & D. Cohen-Or
    Optimizing Photo Composition
    Computer Graphics Forum, 2010, Vol. 29(2), pp. 469-478
    BibTeX
    @article{Liu2010,
     author = {Liu, L., Chen, R., Wolf, L. and Cohen-Or, D},
     title = {Optimizing Photo Composition},
     journal = {Computer Graphics Forum},
     year = {2010},
     volume = {29},
     number = {2},
     pages = {469-478}}
    
  121. M. Liu, N. Yu & W. Li
    Camera Model Identification for JPEG Images via Tensor Analysis
    International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    2010, pp. 462-465
    BibTeX
    @inproceedings{Liu2010a,
     author = {Liu, Ming and Yu, Nenghai and Li, Weihai},
     title = {Camera Model Identification for JPEG Images via Tensor Analysis},
     booktitle = {International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
     year = {2010},
     pages = {462-465}}
    
  122. W. Lu, A.L. Varna & M. Wu
    Forensic hash for multimedia information
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proc. SPIE
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410Y
    BibTeX
    @conference{Lu2010,
     author = {Wenjun Lu and Avinash L. Varna and Min Wu},
     title = {Forensic hash for multimedia information},
     booktitle = {Proc. SPIE},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410Y}}
    
  123. S. Luo, D. Wu & S. Wang
    Hiding traces of the blurring effect in digital forgeries
    Proc. Int Information Networking and Automation (ICINA) Conf
    2010, Vol. 2
    BibTeX
    @inproceedings{Luo2010a,
     author = {Siqing Luo and Di Wu and Shen Wang},
     title = {Hiding traces of the blurring effect in digital forgeries},
     booktitle = {Proc. Int Information Networking and Automation (ICINA) Conf},
     year = {2010},
     volume = {2}}
    
  124. W. Luo, J. Huang & G. Qiu
    JPEG Error Analysis and Its Applications to Digital Image Forensics
    IEEE Transactions on Information Forensics and Security, 2010, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Luo2010,
     author = {Luo, W and Huang, J and Qiu, G},
     title = {JPEG Error Analysis and Its Applications to Digital Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  125. S. Lyu
    Estimating vignetting function from a single image for image authentication
    Proceedings of the 12th ACM workshop on Multimedia and security
    ACM, 2010, pp. 3-12
    BibTeX
    @inproceedings{Lyu2010,
     author = {Lyu, Siwei},
     title = {Estimating vignetting function from a single image for image authentication},
     booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2010},
     pages = {3--12}}
    
  126. J. Mace
    Printer Identification Techniques and Their Privacy Implications
    Newcastle University, University of Newcastle upon Tyne, Computing Science, 2010
    BibTeX
    @techreport{Mace2010,
     author = {Mace, John},
     title = {Printer Identification Techniques and Their Privacy Implications},
     publisher = {University of Newcastle upon Tyne, Computing Science},
     year = {2010}}
    
  127. B. Mahdian & S. Saic
    A bibliography on blind methods for identifying image forgery
    Signal Processing: Image Communication, 2010, Vol. 25(6), pp. 389 - 399
    BibTeX
    @article{Mahdian2010,
     author = {Babak Mahdian and Stanislav Saic},
     title = {A bibliography on blind methods for identifying image forgery},
     journal = {Signal Processing: Image Communication},
     year = {2010},
     volume = {25},
     number = {6},
     pages = {389 - 399}}
    
  128. B. Mahdian & S. Saic
    Blind methods for detecting image fakery
    IEEE Aerospace and Electronic Systems Magazine, 2010, Vol. 25(4), pp. 18-24
    BibTeX
    @article{Mahdian2010a,
     author = {Mahdian, B. and Saic, S.},
     title = {Blind methods for detecting image fakery},
     journal = {IEEE Aerospace and Electronic Systems Magazine},
     year = {2010},
     volume = {25},
     number = {4},
     pages = {18--24}}
    
  129. P. Meerwald & A. Uhl
    Watermarking of Raw Digital Images in Camera Firmware
    IPSJ Transactions on Computer Vision and Applications, 2010, Vol. 2( ), pp. 16-24
    BibTeX
    @article{Meerwald2010,
     author = {Meerwald, Peter and Uhl, Andreas},
     title = {Watermarking of Raw Digital Images in Camera Firmware},
     journal = {IPSJ Transactions on Computer Vision and Applications},
     year = {2010},
     volume = {2},
     number = { },
     pages = {16-24}}
    
  130. X.-z. Meng, S.-z. Niu & J.-c. Zou
    Tamper Detection for Shifted Double JPEG Compression
    Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2010, pp. 434-437
    BibTeX
    @inproceedings{Meng2010,
     author = {Meng, Xian-zhe and Niu, Shao-zhang and Zou, Jian-chen},
     title = {Tamper Detection for Shifted Double JPEG Compression},
     booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2010},
     pages = {434--437}}
    
  131. A.K. Mikkilineni, N. Khanna & E.J. Delp
    Texture based attacks on intrinsic signature based printer identification
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410T
    BibTeX
    @inproceedings{Mikkilineni2010,
     author = {Aravind K. Mikkilineni and Nitin Khanna and Edward J. Delp},
     title = {Texture based attacks on intrinsic signature based printer identification},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410T}}
    
  132. L. Nataraj, A. Sarkar & B.S. Manjunath
    Improving re-sampling detection by adding noise
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410I
    BibTeX
    @inproceedings{Nataraj2010a,
     author = {Lakshmanan Nataraj and Anindya Sarkar and B. S. Manjunath},
     title = {Improving re-sampling detection by adding noise},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410I}}
    
  133. L. Nataraj, A. Sarkar & B.S. Manjunath
    Improving re-sampling detection by adding noise
    Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
    2010, Vol. 7541
    BibTeX
    @inproceedings{Nataraj2010,
     author = {Nataraj, L. and Sarkar, A. and Manjunath, B.~S.},
     title = {Improving re-sampling detection by adding noise},
     booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series},
     year = {2010},
     volume = {7541}}
    
  134. X. Pan & S. Lyu
    Detecting Image Region Duplication Using SIFT Features
    International Conference on Acoustics, Speech, and Signal Processing
    2010
    BibTeX
    @inproceedings{Pan2010,
     author = {Pan, Xunyu and Lyu, Siwei},
     title = {Detecting Image Region Duplication Using SIFT Features},
     booktitle = {International Conference on Acoustics, Speech, and Signal Processing},
     year = {2010}}
    
  135. X. Pan & S. Lyu
    Region Duplication Detection Using Image Feature Matching
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 857-867
    BibTeX
    @article{Pan2010a,
     author = {Pan, Xunyu. and Lyu, Siwei},
     title = {Region Duplication Detection Using Image Feature Matching},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {4},
     pages = {857--867}}
    
  136. F. Peng & X. lan Wang
    Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection
    Proc. Symp. Photonics and Optoelectronic (SOPO)
    2010, pp. 1-4
    BibTeX
    @inproceedings{Peng2010,
     author = {Fei Peng and Xi-lan Wang},
     title = {Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection},
     booktitle = {Proc. Symp. Photonics and Optoelectronic (SOPO)},
     year = {2010},
     pages = {1--4}}
    
  137. S. Prasad
    Signal Processing Algorithms For Digital Image Forensics
    Faculty of Engineering, 2010
    BibTeX
    @mastersthesis{Prasad2010,
     author = {Prasad, S},
     title = {Signal Processing Algorithms For Digital Image Forensics},
     school = {Faculty of Engineering},
     year = {2010}}
    
  138. G. Qadir, X. Zhao & A.T.S. Ho
    Estimating JPEG2000 compression for image forensics using Benford´s Law
    Schelkens, P., Ebrahimi, T., Cristobal, G., Truchetet, F. & Saarikko, P. (ed.)
    Proc. SPIE 7723
    Optics, Photonics, and Digital Technologies for Multimedia Applications, SPIE, 2010, Vol. 7723(1), pp. 77230J
    BibTeX
    @conference{Qadir2010,
     author = {Ghulam Qadir and Xi Zhao and Anthony T. S. Ho},
     title = {Estimating JPEG2000 compression for image forensics using Benford´s Law},
     booktitle = {Proc. SPIE 7723},
     journal = {Optics, Photonics, and Digital Technologies for Multimedia Applications},
     publisher = {SPIE},
     year = {2010},
     volume = {7723},
     number = {1},
     pages = {77230J}}
    
  139. Z. Qidan & L. Ke
    Image stitching using simplified SIFT
    Proc. IEEE Int Information and Automation (ICIA) Conf
    2010, pp. 1134-1137
    BibTeX
    @inproceedings{Qidan2010,
     author = {Zhu Qidan and Li Ke},
     title = {Image stitching using simplified SIFT},
     booktitle = {Proc. IEEE Int Information and Automation (ICIA) Conf},
     year = {2010},
     pages = {1134--1137}}
    
  140. F. Ramsthaler, M. Kettner, S. Potente, A. Gehl, K. Kreutz & M. Verhoff
    Original oder manipuliert?
    Rechtsmedizin, 2010, Vol. -, pp. -
    BibTeX
    @article{Ramsthaler2010,
     author = {Ramsthaler, F. and Kettner, M. and Potente, S. and Gehl, A. and Kreutz, K. and Verhoff, M.A.},
     title = {Original oder manipuliert?},
     journal = {Rechtsmedizin},
     year = {2010},
     volume = {-},
     pages = {--}}
    
  141. J. Redi, W. Taktak & J.-L. Dugelay
    Digital image forensics: a booklet for beginners
    Multimedia Tools and Applications, Springer Netherlands, 2010, pp. 1-30
    BibTeX
    @booklet{Redi2010,
     author = {Redi, Judith and Taktak, Wiem and Dugelay, Jean-Luc},
     title = {Digital image forensics: a booklet for beginners},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Netherlands},
     year = {2010},
     pages = {1-30}}
    
  142. C. Riess & E. Angelopoulou
    Scene Illumination as an Indicator of Image Manipulation
    International Workshop on Information Hiding
    2010
    BibTeX
    @inproceedings{Riess2010,
     author = {Riess, Christian and Angelopoulou, Elli},
     title = {Scene Illumination as an Indicator of Image Manipulation},
     booktitle = {International Workshop on Information Hiding},
     year = {2010}}
    
  143. A.D. Rosa, F. Uccheddu, A. Costanzo, A. Piva & M. Barni
    Exploring image dependencies: a new challenge in image forensics
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410X
    BibTeX
    @inproceedings{Rosa2010,
     author = {A. De Rosa and F. Uccheddu and A. Costanzo and A. Piva and M. Barni},
     title = {Exploring image dependencies: a new challenge in image forensics},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410X}}
    
  144. S.-J. Ryu, H.-Y. Lee, D.-H. Im, J.-H. Choi & H.-K. Lee
    Electrophotographic Printer Identification by Halftone Texture Analysis
    IEEE International Conference on Acoustics, Speech and Signal Processing
    2010, pp. 1846-1849
    BibTeX
    @inproceedings{Ryu2010a,
     author = {Ryu, Seung-Jin and Lee, Hae-Yeoun and Im, Dong-Hyuck and Choi, Jung-Ho and Lee, Heung-Kyu},
     title = {Electrophotographic Printer Identification by Halftone Texture Analysis},
     booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing},
     year = {2010},
     pages = {1846-1849}}
    
  145. S.-J. Ryu, M.-J. Lee & H.-K. Lee
    Detection of Copy-Rotate-Move Forgery using Zernike Moments
    International Workshop on Information Hiding
    2010
    BibTeX
    @inproceedings{Ryu2010,
     author = {Ryu, Seung-Jin and Lee, Min-Jeong and Lee, Heung-Kyu},
     title = {Detection of Copy-Rotate-Move Forgery using Zernike Moments},
     booktitle = {International Workshop on Information Hiding},
     year = {2010}}
    
  146. M. Sharma & S. Jha
    Uses of software in digital image analysis: a forensic report
    Jusoff, K. & Xie, Y. (ed.)
    Second International Conference on Digital Image Processing
    Second International Conference on Digital Image Processing, SPIE, 2010, Vol. 7546(1), pp. 75462B
    BibTeX
    @conference{Sharma2010,
     author = {Mukesh Sharma and Shailendra Jha},
     title = {Uses of software in digital image analysis: a forensic report},
     booktitle = {Second International Conference on Digital Image Processing},
     journal = {Second International Conference on Digital Image Processing},
     publisher = {SPIE},
     year = {2010},
     volume = {7546},
     number = {1},
     pages = {75462B}}
    
  147. F.Y. Shih
    Image processing and pattern recognition
    Hanzo, L. (ed.)
    Wiley-Interscience, 2010
    BibTeX
    @book{Shih2010,
     author = {Frank Y. Shih},
     title = {Image processing and pattern recognition},
     publisher = {Wiley-Interscience},
     year = {2010}}
    
  148. F.Y. Shih & Y. Yuan
    A Comparison Study on Copy-Cover Image Forgery Detection
    The Open Artificial Intelligence Journal, 2010, Vol. 4, pp. 49-54
    BibTeX
    @article{Shih,
     author = {Shih, Frank Y. and Yuan, Yuan},
     title = {A Comparison Study on Copy-Cover Image Forgery Detection},
     journal = {The Open Artificial Intelligence Journal},
     year = {2010},
     volume = {4},
     pages = {49-54}}
    
  149. B. Shivakumar & L.D.S.S. Baboo
    Detecting Copy-Move Forgery in Digital Images:A Survey and Analysis of Current Methods
    Global Journal of Computer Science and Technology, 2010, Vol. 10(7), pp. 61-65
    BibTeX
    @article{Shivakumar2010,
     author = {B.L. Shivakumar and Lt. Dr. S. Santhosh Baboo},
     title = {Detecting Copy-Move Forgery in Digital Images:A Survey and Analysis of Current Methods},
     journal = {Global Journal of Computer Science and Technology},
     year = {2010},
     volume = {10},
     number = {7},
     pages = {61-65}}
    
  150. M. Sorell
    Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
    Klinger, K. (ed.)
    Chapter Digital Camera Photographic Provenance (Chapter 5)
    Information Science Reference, 2010, pp. 104-129
    BibTeX
    @inbook{Sorell2010,
     author = {Matthew Sorell},
     title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions},
     publisher = {Information Science Reference},
     year = {2010},
     pages = {104-129}}
    
  151. M. Stamm & J.R. Liu
    Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints
    IEEE Transactions on Information Forensics and Security, 2010, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Stamm2010a,
     author = {Stamm, M and Liu, J. R.},
     title = {Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  152. M. Stamm & K.J.R. Liu
    Wavelet-Based Image Compression Anti-Forensics
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Stamm2010b,
     author = {Stamm, Matthew and Liu, K. J. Ray},
     title = {Wavelet-Based Image Compression Anti-Forensics},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  153. M. Stamm, S. Tjoa, W.S. Lin & K.J.R. Liu
    Undetectable Image Tampering Through JPEG Compression Anti-Forensics
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Stamm2010d,
     author = {Stamm, Matthew and Tjoa, Steven and Lin, W. Sabrina and Liu, K. J. Ray},
     title = {Undetectable Image Tampering Through JPEG Compression Anti-Forensics},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  154. M.C. Stamm & K.J.R. Liu
    Forensic estimation and reconstruction of a contrast enhancement mapping
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1698-1701
    BibTeX
    @inproceedings{Stamm2010c,
     author = {Stamm, Matthew C. and Liu, K. J. Ray},
     title = {Forensic estimation and reconstruction of a contrast enhancement mapping},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1698--1701}}
    
  155. M.C. Stamm, S.K. Tjoa, W.S. Lin & K.J.R. Liu
    Anti-forensics of JPEG compression
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1694-1697
    BibTeX
    @inproceedings{Stamm2010,
     author = {Stamm, Matthew C. and Tjoa, Steven K. and Lin, W. Sabrina and Liu, K. J. Ray},
     title = {Anti-forensics of JPEG compression},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1694--1697}}
    
  156. M. Steinebach, H. Liu, P. Fan & S. Katzenbeisser
    Cell Phone Camera Ballistics: Attacks and Countermeasures
    SPIE Conference on Multimedia on Mobile Devices
    2010
    BibTeX
    @inproceedings{Steinebach2010a,
     author = {Steinebach, Martin and Liu, Huajian and Fan, Peishuai and Katzenbeisser, Stefan},
     title = {Cell Phone Camera Ballistics: Attacks and Countermeasures},
     booktitle = {SPIE Conference on Multimedia on Mobile Devices},
     year = {2010}}
    
  157. M. Steinebach, H.L. Mohamed El Ouariachi & S. Katzenbeisser
    On the Reliability of Cell Phone Camera Fingerprint Recognition
    Goel, S. (ed.)
    Chapter On the Reliability of Cell Phone Camera Fingerprint Recognition
    Springer Berlin Heidelberg, 2010, Vol. 31, pp. 69-76
    BibTeX
    @inbook{Steinebach2010,
     author = {Steinebach, Martin and Mohamed El Ouariachi, Huajian Liu and Stefan Katzenbeisser},
     title = {On the Reliability of Cell Phone Camera Fingerprint Recognition},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     volume = {31},
     pages = {69-76}}
    
  158. Y. Su & J. Xu
    Detection of Double-Compression in MPEG-2 Videos
    Proc. 2nd Int Intelligent Systems and Applications (ISA) Workshop
    2010, pp. 1-4
    BibTeX
    @inproceedings{Su2010a,
     author = {Yuting Su and Junyu Xu},
     title = {Detection of Double-Compression in MPEG-2 Videos},
     booktitle = {Proc. 2nd Int Intelligent Systems and Applications (ISA) Workshop},
     year = {2010},
     pages = {1--4}}
    
  159. Y. Su, J. Zhang, Y. Han, J. Chen & Q. Liu
    Exposing Digital Video Logo-removal Forgery by Inconsistency of Blur
    International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 2010, Vol. 24(7), pp. 1027-1046
    BibTeX
    @article{Su2010,
     author = {Yuting Su and Jing Zhang and Yu Han and Jing Chen and Qingzhong Liu},
     title = {Exposing Digital Video Logo-removal Forgery by Inconsistency of Blur},
     journal = {International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI)},
     year = {2010},
     volume = {24},
     number = {7},
     pages = {1027-1046}}
    
  160. P. Sutthiwan, Y.Q. Shi, J. Dong, T. Tan & T.-T. Ng
    New Developments in Color Image Tampering Detection
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Sutthiwan2010a,
     author = {Sutthiwan, Patchara and Shi, Yun Qing and Dong, Jing and Tan, Tieniu and Ng, Tian-Tsong},
     title = {New Developments in Color Image Tampering Detection},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  161. P. Sutthiwan, Y.Q. Shi, W. Su & T.-T. Ng
    Rake Transform and Edge Statistics for Image Forgery Detection
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Sutthiwan2010,
     author = {Sutthiwan, Patchara and Shi, Yun Qing and Su, Wei and Ng, Tian-Tsong},
     title = {Rake Transform and Edge Statistics for Image Forgery Detection},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  162. J. Takamatsu, T. Ogasawara, Y. Matsushita & K. Ikeuchi
    Estimating demosaicing algorithms using image noise variance
    Nara Institute of Science and Technology, 2010
    BibTeX
    @techreport{Takamatsu2010,
     author = {Takamatsu, Jun and Ogasawara, Tsukasa and Matsushita, Yasuyuki and Ikeuchi, Katsushi},
     title = {Estimating demosaicing algorithms using image noise variance},
     year = {2010}}
    
  163. P. Tuladhar
    Non­attribution Properties of JPEG Quantization Tables
    University of New Orleans, 2010
    BibTeX
    @mastersthesis{Tuladhar2010,
     author = {Punnya Tuladhar},
     title = {Non­attribution Properties of JPEG Quantization Tables},
     school = {University of New Orleans},
     year = {2010}}
    
  164. F. Uccheddu, A.D. Rosa, A. Piva & M. Barni
    Detection of resampled images: performance analysis and practical challenges
    Proceedings of the 18th European Signal Processing Conference (EUSIPCO-2010)
    2010
    BibTeX
    @inproceedings{Uccheddu2010,
     author = {F. Uccheddu and A. De Rosa and A. Piva and M. Barni},
     title = {Detection of resampled images: performance analysis and practical challenges},
     booktitle = {Proceedings of the 18th European Signal Processing Conference (EUSIPCO-2010)},
     year = {2010}}
    
  165. D. Vazquez-Padin, C. Mosquera & F. Perez-Gonzalez
    Two-Dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Vazquez-Padin2010,
     author = {Vazquez-Padin, David and Mosquera, Carlos and Perez-Gonzalez, Fernando},
     title = {Two-Dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  166. A.W.A. Wahab & P. Bateman
    Conditional Probability Based Camera Identification
    International Journal of Cryptology Research, 2010, Vol. 2(1), pp. 63-71
    BibTeX
    @article{Wahab2010,
     author = {Ainuddin Wahid Abdul Wahab and Philip Bateman},
     title = {Conditional Probability Based Camera Identification},
     journal = {International Journal of Cryptology Research},
     year = {2010},
     volume = {2},
     number = {1},
     pages = {63-71}}
    
  167. G. Wang, W. Lang & J. Wang
    Improved method for source camera forensics using JPEG compression images
    Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
    2010, pp. 84-87
    BibTeX
    @inproceedings{Wang2010a,
     author = {Gengzhong Wang and Wenhui Lang and Jianshe Wang},
     title = {Improved method for source camera forensics using JPEG compression images},
     booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf},
     year = {2010},
     pages = {84--87}}
    
  168. J. Wang, G. Liu, B. Xu, H. Li, Y. Dai & Z. Wang
    Image Forgery Forensics Based on Manual Blurred Edge Detection
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 907-911
    BibTeX
    @inproceedings{Wang2010d,
     author = {Junwen Wang and Guangjie Liu and Bo Xu and Hongyuan Li and Yuewei Dai and Zhiquan Wang},
     title = {Image Forgery Forensics Based on Manual Blurred Edge Detection},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {907--911}}
    
  169. W. Wang, J. Dong & T. Tan
    Image tampering detection based on stationary distribution of Markov chain
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 2101-2104
    BibTeX
    @inproceedings{Wang2010,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Image tampering detection based on stationary distribution of Markov chain},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {2101--2104}}
    
  170. W. Wei, S. Wang, X. Zhang & Z. Tang
    Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(3), pp. 507-517
    BibTeX
    @article{Wei2010,
     author = {Weimin Wei and Shuozhong Wang and Xinpeng Zhang and Zhenjun Tang},
     title = {Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {3},
     pages = {507--517}}
    
  171. J. Weir & W. Yan
    Resolution variant visual cryptography for street view of Google Maps
    Proc. IEEE Int Circuits and Systems (ISCAS) Symp
    2010, pp. 1695-1698
    BibTeX
    @inproceedings{Weir2010,
     author = {Weir, Jonathan and Yan, WeiQi},
     title = {Resolution variant visual cryptography for street view of Google Maps},
     booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp},
     year = {2010},
     pages = {1695--1698}}
    
  172. M. Wohlmayr
    Blind Source Separation: Eine Einführung
    2010
    BibTeX
    @misc{Wohlmayr2010,
     author = {Wohlmayr, Michael},
     title = {Blind Source Separation: Eine Einführung},
     year = {2010}}
    
  173. L. Wu & X. Cao
    Geo-location estimation from two shadow trajectories
    Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
    2010, pp. 585-590
    BibTeX
    @inproceedings{Wu2010a,
     author = {Wu, Lin and Cao, Xiaochun},
     title = {Geo-location estimation from two shadow trajectories},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)},
     year = {2010},
     pages = {585--590}}
    
  174. L. Wu, X. Cao & H. Foroosh
    Camera calibration and geo-location estimation from two shadow trajectories
    Computer Vision and Image Understanding, 2010, Vol. 114(8), pp. 915 - 927
    BibTeX
    @article{Wu2010,
     author = {Lin Wu and Xiaochun Cao and Hassan Foroosh},
     title = {Camera calibration and geo-location estimation from two shadow trajectories},
     journal = {Computer Vision and Image Understanding},
     year = {2010},
     volume = {114},
     number = {8},
     pages = {915 - 927}}
    
  175. W. Xu, H. Huang & W. Yu
    A study of medical image tampering detection
    Proc. Int Medical Image Analysis and Clinical Applications (MIACA) Conf
    2010, pp. 131-134
    BibTeX
    @inproceedings{Xu2010,
     author = {Weijian Xu and Hui Huang and Wenxue Yu},
     title = {A study of medical image tampering detection},
     booktitle = {Proc. Int Medical Image Analysis and Clinical Applications (MIACA) Conf},
     year = {2010},
     pages = {131--134}}
    
  176. T. Yamasaki, T. Matsunami & K. Aizawa
    Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients
    Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2010, pp. 567-570
    BibTeX
    @inproceedings{Yamasaki2010,
     author = {Yamasaki, Toshihiko and Matsunami, Tomoaki and Aizawa, Kiyoharu},
     title = {Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients},
     booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2010},
     pages = {567--570}}
    
  177. R. Yang, Y.Q. Shi & J. Huang
    Detecting Double Compression of Audio Signal
    SPIE Conference on Media Forensics and Security
    2010
    BibTeX
    @inproceedings{Yang2010,
     author = {Yang, Rui and Shi, Yun Qing and Huang, Jiwu},
     title = {Detecting Double Compression of Audio Signal},
     booktitle = {SPIE Conference on Media Forensics and Security},
     year = {2010}}
    
  178. C. Zhang & H. Zhang
    Exposing Digital Image Forgeries by Using Canonical Correlation Analysis
    Proc. 20th Int Pattern Recognition (ICPR) Conf
    2010, pp. 838-841
    BibTeX
    @inproceedings{Zhang2010b,
     author = {Chi Zhang and Hongbin Zhang},
     title = {Exposing Digital Image Forgeries by Using Canonical Correlation Analysis},
     booktitle = {Proc. 20th Int Pattern Recognition (ICPR) Conf},
     year = {2010},
     pages = {838--841}}
    
  179. C. Zhang & H. Zhang
    Identifying color image origin using curvelet transform
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 2125-2128
    BibTeX
    @inproceedings{Zhang2010c,
     author = {Zhang, Chi and Zhang, Hongbin},
     title = {Identifying color image origin using curvelet transform},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {2125--2128}}
    
  180. W. Zhang, X. Cao, Y. Qu, Y. Hou, H. Zhao & C. Zhang
    Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(3), pp. 544-555
    BibTeX
    @article{Zhang2010,
     author = {Zhang, W. and Cao, X. and Qu, Y. and Hou, Y. and Zhao, H. and Zhang, C.},
     title = {Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {3},
     pages = {544--555}}
    
  181. Z. Zhang, Z. Yu & B. Su
    Detection of composite forged image
    Proc. Int Computer Application and System Modeling (ICCASM) Conf
    2010, Vol. 11
    BibTeX
    @inproceedings{Zhang2010a,
     author = {Zhen Zhang and Zhou Yu and BaiNa Su},
     title = {Detection of composite forged image},
     booktitle = {Proc. Int Computer Application and System Modeling (ICCASM) Conf},
     year = {2010},
     volume = {11}}
    
  182. F. Zhao, Z. Yu & S. Li
    Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms
    Proc. Int Multimedia Technology (ICMT) Conf
    2010, pp. 1-4
    BibTeX
    @inproceedings{Zhao2010,
     author = {Feng Zhao and Zhenhua Yu and Shenghong Li},
     title = {Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms},
     booktitle = {Proc. Int Multimedia Technology (ICMT) Conf},
     year = {2010},
     pages = {1--4}}
    
  183. E. Zheng, X. Ping & T. Zhang
    Detecting Composite JPEG Images in Transform Domain
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 340-344
    BibTeX
    @inproceedings{Zheng2010,
     author = {Ergong Zheng and Xijian Ping and Tao Zhang},
     title = {Detecting Composite JPEG Images in Transform Domain},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {340--344}}
    
  184. Q. Zheng, W. Sun & W. Lu
    Digital spliced image forensics based on edge blur measurement
    Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
    2010, pp. 399-402
    BibTeX
    @inproceedings{Zheng2010a,
     author = {Qianru Zheng and Wei Sun and Wei Lu},
     title = {Digital spliced image forensics based on edge blur measurement},
     booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf},
     year = {2010},
     pages = {399--402}}
    
  185. Z.-p. Zhou & X.-x. Zhang
    Image splicing detection based on image quality and analysis of variance
    Proc. 2nd Int Education Technology and Computer (ICETC) Conf
    2010, Vol. 4
    BibTeX
    @inproceedings{Zhou2010,
     author = {Zhou, Zhi-ping and Zhang, Xiao-xiang},
     title = {Image splicing detection based on image quality and analysis of variance},
     booktitle = {Proc. 2nd Int Education Technology and Computer (ICETC) Conf},
     year = {2010},
     volume = {4}}
    


2009

  1. R. Achanta & S. Susstrunk
    Saliency detection for content-aware image resizing
    Proc. 16th IEEE Int Image Processing (ICIP) Conf
    2009, pp. 1005-1008
    BibTeX
    @inproceedings{Achanta2009,
     author = {Achanta, R. and Susstrunk, S. },
     title = {Saliency detection for content-aware image resizing},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf},
     year = {2009},
     pages = {1005--1008}}
    
  2. S. Aja-Fernández, G.V. Sánchez-Ferrero, M. Martín-Fernández & C. Alberola-López
    Automatic noise estimation in images using local statistics. Additive and multiplicative cases
    Image and Vision Computing , 2009, Vol. 27(6), pp. 756 - 770
    BibTeX
    @article{Aja-Fernandez2009,
     author = {Santiago Aja-Fernández and Gonzalo Vegas-Sánchez-Ferrero and Marcos Martín-Fernández and Carlos Alberola-López},
     title = {Automatic noise estimation in images using local statistics. Additive and multiplicative cases },
     journal = {Image and Vision Computing },
     year = {2009},
     volume = {27},
     number = {6},
     pages = {756 - 770}}
    
  3. E.J. Alles, Z.J. Geradts & C.J. Veenman
    Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images
    Journal of Forensic Sciences, 2009, Vol. 54(3), pp. 628-638
    BibTeX
    @article{Alles2009,
     author = {Alles, Erwin J. and Geradts, Zeno J. and Veenman, Cor. J.},
     title = {Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images},
     journal = {Journal of Forensic Sciences},
     year = {2009},
     volume = {54},
     number = {3},
     pages = {628-638}}
    
  4. I. Amerini, R. Caldelli, V. Cappellini, F. Picchioni & A. Piva
    Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification
    DSP´09: Proceedings of the 16th international conference on Digital Signal Processing
    IEEE Press, 2009, pp. 511-517
    BibTeX
    @inproceedings{Amerini2009,
     author = {Amerini, Irene and Caldelli, Roberto and Cappellini, Vito and Picchioni, Francesco and Piva, Alessandro},
     title = {Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification},
     booktitle = {DSP´09: Proceedings of the 16th international conference on Digital Signal Processing},
     publisher = {IEEE Press},
     year = {2009},
     pages = {511--517}}
    
  5. E. Ardizzone & G. Mazzola
    Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis
    Image Analysis and Processing
    2009, pp. 893-901
    BibTeX
    @inproceedings{Ardizzone2009,
     author = {Ardizzone, Edoardo and Mazzola, Giuseppe},
     title = {Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis},
     booktitle = {Image Analysis and Processing},
     year = {2009},
     pages = {893-901}}
    
  6. N. Bartlow, N. Kalka, B. Cukic & A. Ross
    Identifying sensors from fingerprint images
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009
    2009, pp. 78-84
    BibTeX
    @inproceedings{Bartlow2009,
     author = {Bartlow, N. and Kalka, N. and Cukic, B. and Ross, A.},
     title = {Identifying sensors from fingerprint images},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009},
     year = {2009},
     pages = {78--84}}
    
  7. P. Bateman, A.T.S. Ho & A. Woodward
    Image Forensics of Digital Cameras by Analysing Image Variations Using Statistical Process Control
    International Conference on Information, Communications and Signal Processing
    2009
    BibTeX
    @inproceedings{Bateman2009,
     author = {Bateman, Philip and Ho, Anthony T. S. and Woodward, Alan},
     title = {Image Forensics of Digital Cameras by Analysing Image Variations Using Statistical Process Control},
     booktitle = {International Conference on Information, Communications and Signal Processing},
     year = {2009}}
    
  8. S. Battiato & G. Messina
    Digital forgery estimation into DCT domain: a critical analysis
    MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics
    ACM, 2009, pp. 37-42
    BibTeX
    @inproceedings{Battiato2009,
     author = {Battiato, Sebastiano and Messina, Giuseppe},
     title = {Digital forgery estimation into DCT domain: a critical analysis},
     booktitle = {MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics},
     publisher = {ACM},
     year = {2009},
     pages = {37--42}}
    
  9. S. Battiato, G. Messina & R. Rizzo
    Image Forensics
    Università di Catania Dipartimento di Matematica ed Informatica Image Processing Laboratory, 2009
    BibTeX
    @techreport{Battiato2009a,
     author = {Battiato, Sebastiano and Messina, Giuseppe and Rizzo, Rosetta},
     title = {Image Forensics},
     year = {2009}}
    
  10. S. Bayram, H.T. Sencar & N. Memon
    An efficient and robust method for detecting copy-move forgery
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009
    2009, pp. 1053-1056
    BibTeX
    @inproceedings{Bayram2009,
     author = {Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {An efficient and robust method for detecting copy-move forgery},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009},
     year = {2009},
     pages = {1053--1056}}
    
  11. R. Böhme, F. Freiling, T. Gloe & M. Kirchner
    Multimedia-Forensik als Teildisziplin der digitalen Forensik
    Fischer, S., Maehle, E. & Reischuk, R. (ed.)
    Informatik 2009, Im Fokus das Leben, 28.9.-2.10.2009, Lübeck,
    2009, Vol. 154
    BibTeX
    @conference{Boehme2009,
     author = {Böhme, R. and Freiling, F. and Gloe, T. and Kirchner, M.},
     title = {Multimedia-Forensik als Teildisziplin der digitalen Forensik},
     booktitle = {Informatik 2009, Im Fokus das Leben, 28.9.-2.10.2009, Lübeck,},
     year = {2009},
     volume = {154}}
    
  12. R. Böhme, F. Freiling, T. Gloe & M. Kirchner
    Multimedia Forensics is not Computer Forensics
    Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
    Third International Workshop on Computational Forensics
    2009, pp. 90-103
    BibTeX
    @inproceedings{Bohme2009,
     author = {Böhme, Rainer and Freiling, Felix and Gloe, Thomas and Kirchner, Matthias},
     title = {Multimedia Forensics is not Computer Forensics},
     booktitle = {Third International Workshop on Computational Forensics},
     year = {2009},
     pages = {90-103}}
    
  13. A. Bovik
    The Essential Guide to Image Processing
    Academic Press, 2009
    BibTeX
    @book{Bovik2009,
     author = {Bovik, Al},
     title = {The Essential Guide to Image Processing},
     publisher = {Academic Press},
     year = {2009}}
    
  14. S. Bravo-Solorio & A.K. Nandi
    Passive Forensic Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling
    Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009)
    2009, pp. 824-828
    BibTeX
    @inproceedings{Bravo-Solorio2009,
     author = {Bravo-Solorio, Sergio and Nandi, Asoke K.},
     title = {Passive Forensic Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling},
     booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009)},
     year = {2009},
     pages = {824-828}}
    
  15. S. Bravo-Solorio & A.K. Nandi
    Passive Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling
    European Signal Processing Conference
    2009, pp. 824-828
    BibTeX
    @inproceedings{Bravo-Solorio2009a,
     author = {Bravo-Solorio, Sergio and Nandi, Asoke K.},
     title = {Passive Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling},
     booktitle = {European Signal Processing Conference},
     year = {2009},
     pages = {824-828}}
    
  16. O. Bulan, J. Mao & G. Sharma
    Geometric Distortion Signatures for Printer Identification
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2009, pp. 1401-1404
    BibTeX
    @inproceedings{Bulan2009,
     author = {Bulan, Orhan and Mao, Junwen and Sharma, Gaurav},
     title = {Geometric Distortion Signatures for Printer Identification},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2009},
     pages = {1401-1404}}
    
  17. R. Caldelli, I. Amerini & F. Picchioni
    Forensics in Telecommunications, Information and Multimedia
    Sorell, M. (ed.)
    Forensics in Telecommunications, Information and Multimedia
    Chapter Distinguishing between Camera and Scanned Images by Means of Frequency Analysis
    Springer Berlin Heidelberg, 2009, pp. 95-+
    BibTeX
    @inbook{Caldelli2009,
     author = {Caldelli, R. and Amerini, I. and Picchioni, F.},
     title = {Forensics in Telecommunications, Information and Multimedia},
     booktitle = {Forensics in Telecommunications, Information and Multimedia},
     publisher = {Springer Berlin Heidelberg},
     year = {2009},
     pages = {95-+}}
    
  18. R. Caldelli, I. Amerini & F. Picchioni
    Distinguishing Between Camera and Scanned Images by Means of Frequency Analysis
    Sorell, M. (ed.)
    International Conference on Forensics in Telecommunications, Information and Multimedia
    2009
    BibTeX
    @inproceedings{Caldelli2009c,
     author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco},
     title = {Distinguishing Between Camera and Scanned Images by Means of Frequency Analysis},
     booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia},
     year = {2009}}
    
  19. R. Caldelli, I. Amerini, F. Picchioni, A.D. Rosa & V. Cappellini
    Multimedia Forensics: Technologies for Imagery Investigation
    Electronic Information, the Visual Arts and Beyond
    2009, pp. 87-92
    BibTeX
    @inproceedings{Caldelli2009a,
     author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco and Rosa, Alessia De and Cappellini, Vito},
     title = {Multimedia Forensics: Technologies for Imagery Investigation},
     booktitle = {Electronic Information, the Visual Arts and Beyond},
     year = {2009},
     pages = {87-92}}
    
  20. G. Cao, Y. Zhao & R. Ni
    Detection of image sharpening based on histogram aberration and ringing artifacts
    ICME´09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo
    IEEE Press, 2009, pp. 1026-1029
    BibTeX
    @inproceedings{Cao2009b,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong},
     title = {Detection of image sharpening based on histogram aberration and ringing artifacts},
     booktitle = {ICME´09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo},
     publisher = {IEEE Press},
     year = {2009},
     pages = {1026--1029}}
    
  21. H. Cao & A.C. Kot
    RAW Tool Identification Though Detected Demosaicing Regularity
    Proc. 16th IEEE Int Image Processing (ICIP) Conf, 2009
    2009
    BibTeX
    @inproceedings{Cao2009,
     author = {Cao, Hong and Kot, Alex C},
     title = {RAW Tool Identification Though Detected Demosaicing Regularity},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf, 2009},
     year = {2009}}
    
  22. H. Cao & A.C. Kot
    Accurate detection of demosaicing regularity for digital image forensics
    Trans. Info. For. Sec., IEEE Press, 2009, Vol. 4(4), pp. 899-910
    BibTeX
    @article{Cao2009a,
     author = {Cao, Hong and Kot, Alex C.},
     title = {Accurate detection of demosaicing regularity for digital image forensics},
     journal = {Trans. Info. For. Sec.},
     publisher = {IEEE Press},
     year = {2009},
     volume = {4},
     number = {4},
     pages = {899--910}}
    
  23. D. Chen, J. Li, S. Wang & S. Li
    Identifying computer generated and digital camera images using fractional lower order moments
    Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009
    2009, pp. 230-235
    BibTeX
    @inproceedings{Chen2009,
     author = {Dongmei Chen and Jianhua Li and Shilin Wang and Shenghong Li},
     title = {Identifying computer generated and digital camera images using fractional lower order moments},
     booktitle = {Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009},
     year = {2009},
     pages = {230--235}}
    
  24. J. Chen, C.-K. Tang & J. Wang
    Noise brush: interactive high quality image-noise separation
    ACM Transactions on Graphics, 2009, Vol. 28, pp. 146:1-146:10
    BibTeX
    @article{Chen2009b,
     author = {Chen, Jia and Tang, Chi-Keung and Wang, Jue},
     title = {Noise brush: interactive high quality image-noise separation},
     journal = {ACM Transactions on Graphics},
     year = {2009},
     volume = {28},
     pages = {146:1--146:10}}
    
  25. J. Chen, K. Venkataraman, D. Bakin, B. Rodricks, R. Gravelle, P. Rao & Y. Ni
    Digital Camera Imaging System Simulation
    IEEE Transactions on Electron Devices, 2009, Vol. 56(11), pp. 2496-2505
    BibTeX
    @article{Chen2009c,
     author = {Junqing Chen and Venkataraman, K. and Bakin, D. and Rodricks, B. and Gravelle, R. and Rao, P. and Yongshen Ni},
     title = {Digital Camera Imaging System Simulation},
     journal = {IEEE Transactions on Electron Devices},
     year = {2009},
     volume = {56},
     number = {11},
     pages = {2496--2505}}
    
  26. Y.-L. Chen & C.-T. Hsu
    Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration
    IEEE Workshop on Multimedia Signal Processing
    2009
    BibTeX
    @inproceedings{Chen2009a,
     author = {Chen, Yi-Lei and Hsu, Chiou-Ting},
     title = {Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2009}}
    
  27. P.-J. Chiang, N. Khanna, A.K. Mikkilineni, M.V.O. Segovia, S. Suh, J.P. Allebach, G.T.-C. Chiu & E.J. Delp
    Printer and Scanner Forensics
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 72-83
    BibTeX
    @article{Chiang2009,
     author = {Chiang, Pei-Ju and Khanna, Nitin and Mikkilineni, Aravind K. and Segovia, Maria V. Ortiz and Suh, Sungjoo and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.},
     title = {Printer and Scanner Forensics},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {72-83}}
    
  28. J.-H. Choi, D.-H. Im, H.-Y. Lee, J.-T. Oh, J.-H. Ryu & H.-K. Lee
    Color Laser Printer Identification by Analyzing Statistical Features on Discrete Wavelet Transform
    IEEE International Conference on Image Processing
    2009, pp. 1505-1508
    BibTeX
    @inproceedings{Choi2009,
     author = {Choi, Jung-Ho and Im, Dong-Hyuck and Lee, Hae-Yeoun and Oh, Jun-Taek and Ryu, Jin-Ho and Lee, Heung-Kyu},
     title = {Color Laser Printer Identification by Analyzing Statistical Features on Discrete Wavelet Transform},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {1505-1508}}
    
  29. W.-H. Chuang, A. Swaminathan & M. Wu
    Tampering identification using Empirical Frequency Response
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009
    2009, pp. 1517-1520
    BibTeX
    @inproceedings{Chuang2009,
     author = {Wei-Hong Chuang and Swaminathan, A. and Min Wu},
     title = {Tampering identification using Empirical Frequency Response},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009},
     year = {2009},
     pages = {1517--1520}}
    
  30. S.-W. Chung, B.-K. Kim & W.-J. Song
    Detecting and eliminating chromatic aberration in digital images
    Proc. 16th IEEE Int Image Processing (ICIP) Conf
    2009, pp. 3905-3908
    BibTeX
    @inproceedings{Chung2009,
     author = {Soon-Wook Chung and Byoung-Kwang Kim and Woo-Jin Song},
     title = {Detecting and eliminating chromatic aberration in digital images},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf},
     year = {2009},
     pages = {3905--3908}}
    
  31. B. DAlessandro & Y.Q. Shi
    MP3Bit Rate Quality Detection Through Frequency Spectrum Analysis
    ACM Proceedings of the Multimedia and Security Workshop
    2009, pp. 57-62
    BibTeX
    @inproceedings{DAlessandro2009,
     author = {DAlessandro, Brian and Shi, Yun Qing},
     title = {MP3Bit Rate Quality Detection Through Frequency Spectrum Analysis},
     booktitle = {ACM Proceedings of the Multimedia and Security Workshop},
     year = {2009},
     pages = {57-62}}
    
  32. M.U. Devi, A. Agarwal & C.R. Rao
    Gaussian Variogram Model for Printing Technology Identification
    Proc. Third Asia Int. Conf. Modelling & Simulation AMS ´09
    2009, pp. 320-325
    BibTeX
    @inproceedings{Devi2009,
     author = {Devi, M. U. and Agarwal, A. and Rao, C. R.},
     title = {Gaussian Variogram Model for Printing Technology Identification},
     booktitle = {Proc. Third Asia Int. Conf. Modelling & Simulation AMS ´09},
     year = {2009},
     pages = {320--325}}
    
  33. A.E. Dirik & N. Memon
    Image tamper detection based on demosaicing artifacts
    Proc. 16th IEEE Int Image Processing (ICIP) Conf
    2009, pp. 1497-1500
    BibTeX
    @inproceedings{Dirik2009,
     author = {Dirik, A. E. and Memon, N.},
     title = {Image tamper detection based on demosaicing artifacts},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf},
     year = {2009},
     pages = {1497--1500}}
    
  34. A.E. Dirik, H.T. Sencar & N. Memon
    Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2009, pp. 1385-1388
    BibTeX
    @inproceedings{Dirik2009a,
     author = {Dirik, Ahmet Emir and Sencar, Husrev T. and Memon, Nasir},
     title = {Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2009},
     pages = {1385-1388}}
    
  35. N. Fan, C. Jin & Y. Huang
    A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation
    MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security
    ACM, 2009, pp. 125-130
    BibTeX
    @inproceedings{Fan2009,
     author = {Fan, Na and Jin, Cheng and Huang, Yizhen},
     title = {A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation},
     booktitle = {MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2009},
     pages = {125--130}}
    
  36. Y. Fang, A.E. Dirik, X. Sun & N. Memon
    Source Class Identification for DSLR and Compact Cameras
    IEEE Workshop on Multimedia Signal Processing
    2009
    BibTeX
    @inproceedings{Fang2009b,
     author = {Fang, Yanmei and Dirik, Ahmet Emir and Sun, Xiaoxi and Memon, Nasir},
     title = {Source Class Identification for DSLR and Compact Cameras},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2009}}
    
  37. Z. Fang, S. Wang & X. Zhang
    Image Splicing Detection Using Camera Characteristic Inconsistency
    Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09
    2009, Vol. 1, pp. 20-24
    BibTeX
    @inproceedings{Fang2009,
     author = {Zhen Fang and Shuozhong Wang and Xinpeng Zhang},
     title = {Image Splicing Detection Using Camera Characteristic Inconsistency},
     booktitle = {Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09},
     year = {2009},
     volume = {1},
     pages = {20--24}}
    
  38. H. Farid
    Advances in Computers
    Zelkowitz, M. (ed.)
    Chapter Photo Fakery and Forensics
    Elsevier, 2009, Vol. 77, pp. 1-55
    BibTeX
    @inbook{Farid2009h,
     author = {Farid, Hany},
     title = {Advances in Computers},
     publisher = {Elsevier},
     year = {2009},
     volume = {77},
     pages = {1-55}}
    
  39. H. Farid
    Image forgery detection
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 16-25
    BibTeX
    @article{Farid2009,
     author = {Farid, Hany},
     title = {Image forgery detection},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {16--25}}
    
  40. H. Farid
    Seeing is not believing
    IEEE Spectrum, 2009, Vol. 46(8), pp. 44-51
    BibTeX
    @article{Farid2009a,
     author = {Farid, Hany},
     title = {Seeing is not believing},
     journal = {IEEE Spectrum},
     year = {2009},
     volume = {46},
     number = {8},
     pages = {44--51}}
    
  41. H. Farid
    Exposing Digital Forgeries From JPEG Ghosts
    IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(1), pp. 154-160
    BibTeX
    @article{Farid2009b,
     author = {Farid, Hany},
     title = {Exposing Digital Forgeries From JPEG Ghosts},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2009},
     volume = {4},
     number = {1},
     pages = {154--160}}
    
  42. H. Farid
    A Survey of Image Forgery Detection
    IEEE Signal Processing Magazine, 2009, Vol. 2(26), pp. 16-25
    BibTeX
    @article{Farid2009d,
     author = {Farid, Hany},
     title = {A Survey of Image Forgery Detection},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {2},
     number = {26},
     pages = {16-25}}
    
  43. H. Farid
    The Lee Harvey Oswald Backyard Photos: Real or Fake?
    Perception, 2009, Vol. 11(38), pp. 1731-1734
    BibTeX
    @article{Farid2009f,
     author = {Farid, Hany},
     title = {The Lee Harvey Oswald Backyard Photos: Real or Fake?},
     journal = {Perception},
     year = {2009},
     volume = {11},
     number = {38},
     pages = {1731-1734}}
    
  44. H. Farid
    Deception: Methods, Motives, Contexts and Consequences
    Chapter Digital Doctoring: can we trust photographs?
    Stanford University Press, 2009, pp. 95-108
    BibTeX
    @inbook{Farid2009g,
     author = {Farid, Hany},
     title = {Deception: Methods, Motives, Contexts and Consequences},
     publisher = {Stanford University Press},
     year = {2009},
     pages = {95-108}}
    
  45. D.F. Francisco Estrada & A. Jepson
    Stochastic Image Denoising
    Proceedings of the British Machine Vision Conference (BMVC)
    2009
    BibTeX
    @inproceedings{Estrada2009,
     author = {Francisco Estrada, David Fleet and Allan Jepson},
     title = {Stochastic Image Denoising},
     booktitle = {Proceedings of the British Machine Vision Conference (BMVC)},
     year = {2009}}
    
  46. J. Fridrich
    Digital Image Forensics Using Sensor Noise
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 26-37
    BibTeX
    @article{Fridrich2009,
     author = {Jessica Fridrich},
     title = {Digital Image Forensics Using Sensor Noise},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {26--37}}
    
  47. J. Fridrich
    Digital Image Forensics
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 26-37
    BibTeX
    @article{Fridrich2009a,
     author = {Fridrich, J.},
     title = {Digital Image Forensics},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {26--37}}
    
  48. M.D. Gaubatz & S.J. Simske
    Printer-scanner identification via analysis of structured security deterrents
    Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
    2009, pp. 151-155
    BibTeX
    @inproceedings{Gaubatz2009,
     author = {Matthew D. Gaubatz and Steven J. Simske},
     title = {Printer-scanner identification via analysis of structured security deterrents},
     booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security},
     year = {2009},
     pages = {151--155}}
    
  49. M.D. Gaubatz, R. Ulichney & D. Rouse
    A Low-complexity Reduced-reference Print Identification Algorithm
    IEEE International Conference on Image Processing
    2009, pp. 1281-1284
    BibTeX
    @inproceedings{Gaubatz2009a,
     author = {Gaubatz, Matthew D. and Ulichney, Robert and Rouse, David},
     title = {A Low-complexity Reduced-reference Print Identification Algorithm},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {1281-1284}}
    
  50. T. Gloe, K. Borowka & A. Winkler
    Feature-Based Camera Model Identification Works in Practice: Results of a Comprehensive Evaluation Study
    Katzenbeisser, S. & Sadeghi, A.-R. (ed.)
    International Workshop on Information Hiding
    2009, pp. 262-276
    BibTeX
    @inproceedings{Gloe2009,
     author = {Gloe, Thomas and Borowka, Karsten and Winkler, Antje},
     title = {Feature-Based Camera Model Identification Works in Practice: Results of a Comprehensive Evaluation Study},
     booktitle = {International Workshop on Information Hiding},
     year = {2009},
     pages = {262-276}}
    
  51. S. Goldenstein & A. Rocha
    High-profile forensic analysis of images
    Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf
    2009, pp. 1-6
    BibTeX
    @inproceedings{Goldenstein2009,
     author = {Goldenstein, Siome and Rocha, Anderson},
     title = {High-profile forensic analysis of images},
     booktitle = {Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf},
     year = {2009},
     pages = {1--6}}
    
  52. T. Goldstein & S. Osher
    The Split Bregman Method for L1-Regularized Problems
    SIAM Journal on Imaging Sciences, SIAM, 2009, Vol. 2(2), pp. 323-343
    BibTeX
    @article{Goldstein2009,
     author = {Tom Goldstein and Stanley Osher},
     title = {The Split Bregman Method for L1-Regularized Problems},
     journal = {SIAM Journal on Imaging Sciences},
     publisher = {SIAM},
     year = {2009},
     volume = {2},
     number = {2},
     pages = {323-343}}
    
  53. M. Goljan
    Digital Camera Identification from Images - Estimating False Acceptance Probability
    Digital Watermarking, Springer-Verlag, 2009, Vol. 5450/2009, pp. 454-468
    BibTeX
    @article{Goljan2009,
     author = {Goljan, Miroslav},
     title = {Digital Camera Identification from Images - Estimating False Acceptance Probability},
     journal = {Digital Watermarking},
     publisher = {Springer-Verlag},
     year = {2009},
     volume = {5450/2009},
     pages = {454--468}}
    
  54. M. Goljan, J. Fridrich & T. Filler
    Large Scale Test of Sensor Fingerprint Camera Identification
    SPIE Conference on Media Forensics and Security
    2009
    BibTeX
    @inproceedings{Goljan2009a,
     author = {Goljan, Miroslav and Fridrich, Jessica and Filler, Tomáš},
     title = {Large Scale Test of Sensor Fingerprint Camera Identification},
     booktitle = {SPIE Conference on Media Forensics and Security},
     year = {2009}}
    
  55. H. Gou, A. Swaminathan & M. Wu
    Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images
    IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(3), pp. 476-491
    BibTeX
    @article{Gou2009,
     author = {Hongmei Gou and Swaminathan, A. and Min Wu},
     title = {Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2009},
     volume = {4},
     number = {3},
     pages = {476--491}}
    
  56. C. Grigoras, A. Cooper & M. Michalek
    Forensic Speech and Audio Analysis Working Group - Best Practice Guidelines for ENF Analysis in Forensic Authentication of Digital Evidence
    2009
    BibTeX
    @misc{Grigoras2009,
     author = {Grigoras, Catalin and Cooper, Alan and Michalek, Marcin},
     title = {Forensic Speech and Audio Analysis Working Group - Best Practice Guidelines for ENF Analysis in Forensic Authentication of Digital Evidence},
     year = {2009}}
    
  57. G. Gül & I. Avcibas
    Source Cell Phone Camera Identification Based on Singular Value Decomposition
    IEEE Workshop on Information Forensics and Security
    2009, pp. 171-175
    BibTeX
    @inproceedings{Gul2009,
     author = {Gül, Gökhan and Avcibas, Ismail},
     title = {Source Cell Phone Camera Identification Based on Singular Value Decomposition},
     booktitle = {IEEE Workshop on Information Forensics and Security},
     year = {2009},
     pages = {171-175}}
    
  58. M. Huijbregtse & Z.J. Geradts
    Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings
    Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
    International Workshop on Computational Forensics
    2009, pp. 116-124
    BibTeX
    @inproceedings{Huijbregtse2009,
     author = {Huijbregtse, Maarten and Geradts, Zeno J.},
     title = {Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings},
     booktitle = {International Workshop on Computational Forensics},
     year = {2009},
     pages = {116-124}}
    
  59. N. Jenkins
    Digital Camera Identification
    2009
    BibTeX
    @misc{Jenkins2009,
     author = {Jenkins, Neil},
     title = {Digital Camera Identification},
     year = {2009}}
    
  60. L. Jiaxue & G. Lei
    Image Denoising Using Adaptive Threshold Based on Second Generation Bandelets Transform
    Proc. Int. Forum Computer Science-Technology and Applications IFCSTA ´09
    2009, Vol. 1, pp. 444-447
    BibTeX
    @inproceedings{Jiaxue2009,
     author = {Liu Jiaxue and Guo Lei},
     title = {Image Denoising Using Adaptive Threshold Based on Second Generation Bandelets Transform},
     booktitle = {Proc. Int. Forum Computer Science-Technology and Applications IFCSTA ´09},
     year = {2009},
     volume = {1},
     pages = {444--447}}
    
  61. T. Jing, Y. Peng, F. Zhang & Y. Huo
    Blind Detection of Digital Forgeries Using Detection Trace of Eclosion
    Proc. Int. Conf. Computational Intelligence and Software Engineering CiSE 2009
    2009, pp. 1-4
    BibTeX
    @inproceedings{Jing2009,
     author = {Tao Jing and Yuefeng Peng and Feifei Zhang and Yan Huo},
     title = {Blind Detection of Digital Forgeries Using Detection Trace of Eclosion},
     booktitle = {Proc. Int. Conf. Computational Intelligence and Software Engineering CiSE 2009},
     year = {2009},
     pages = {1--4}}
    
  62. N. Joshi, C.L. Zitnick, R. Szeliski & D.J. Kriegman
    Image deblurring and denoising using color priors
    Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009
    2009, pp. 1550-1557
    BibTeX
    @inproceedings{Joshi2009,
     author = {Joshi, N. and Zitnick, C. L. and Szeliski, R. and Kriegman, D. J. },
     title = {Image deblurring and denoising using color priors},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009},
     year = {2009},
     pages = {1550--1557}}
    
  63. K. Kayabol, E. Kuruoglu & B. Sankur
    Image Source Separation Using Color Channel Dependencies
    Adali, T., Jutten, C., Romano, J. & Barros, A. (ed.)
    Independent Component Analysis and Signal Separation
    Springer Berlin / Heidelberg, 2009, Vol. 5441, pp. 499-506
    BibTeX
    @incollection{Kayabol2009,
     author = {Kayabol, Koray and Kuruoglu, Ercan and Sankur, Bulent},
     title = {Image Source Separation Using Color Channel Dependencies},
     booktitle = {Independent Component Analysis and Signal Separation},
     publisher = {Springer Berlin / Heidelberg},
     year = {2009},
     volume = {5441},
     pages = {499-506}}
    
  64. E. Kee & H. Farid
    Detecting Photographic Composites of Famous People
    Department of Computer Science, Dartmouth College, 2009(TR2009-656)
    BibTeX
    @techreport{Kee2009,
     author = {Kee, Eric and Farid, Hany},
     title = {Detecting Photographic Composites of Famous People},
     year = {2009},
     number = {TR2009-656}}
    
  65. N. Khanna & E.J. Delp
    Source Scanner Identification for Scanned Documents
    IEEE Workshop on Information Forensics and Security
    2009, pp. 166-170
    BibTeX
    @inproceedings{Khanna2009c,
     author = {Khanna, Nitin and Delp, Edward J.},
     title = {Source Scanner Identification for Scanned Documents},
     booktitle = {IEEE Workshop on Information Forensics and Security},
     year = {2009},
     pages = {166-170}}
    
  66. N. Khanna, A.K. Mikkilineni & E.J. Delp
    Scanner Identification Using Feature-Based Processing and Analysis
    IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(1), pp. 123-139
    BibTeX
    @article{Khanna2009,
     author = {Khanna, N. and Mikkilineni, A. K. and Delp, E. J.},
     title = {Scanner Identification Using Feature-Based Processing and Analysis},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2009},
     volume = {4},
     number = {1},
     pages = {123--139}}
    
  67. N. Khanna, A.K. Mikkilineni & E.J. Delp
    Forensic Camera Classification: Verification of Sensor Pattern Noise Approach
    Forensic Science Communications, 2009, Vol. 11(1), pp. 10
    BibTeX
    @article{Khanna2009b,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Delp, Edward J.},
     title = {Forensic Camera Classification: Verification of Sensor Pattern Noise Approach},
     journal = {Forensic Science Communications},
     year = {2009},
     volume = {11},
     number = {1},
     pages = {10}}
    
  68. S. Kiltz, T. Hoppe & J. Dittmann
    A New Forensic Model And Its Application To The Collection, Extraction And Long Term Storage Of Screen Content Off A Memory Dump
    International Conference on Digital Signal Processing
    2009, pp. 1135-1140
    BibTeX
    @inproceedings{Kiltz2009a,
     author = {Kiltz, Stefan and Hoppe, Tobias and Dittmann, Jana},
     title = {A New Forensic Model And Its Application To The Collection, Extraction And Long Term Storage Of Screen Content Off A Memory Dump},
     booktitle = {International Conference on Digital Signal Processing},
     year = {2009},
     pages = {1135-1140}}
    
  69. S. Kiltz, T. Hoppe, J. Dittmann & C. Vielhauer
    Video Surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump
    Fischer, S., Maehle, E. & Reischuk, R. (ed.)
    Informatik2009 - Digitale Multimedia-Forensik
    2009, pp. 1619-1633
    BibTeX
    @inproceedings{Kiltz2009,
     author = {Kiltz, Stefan and Hoppe, Tobias and Dittmann, Jana and Vielhauer, Claus},
     title = {Video Surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump},
     booktitle = {Informatik2009 - Digitale Multimedia-Forensik},
     year = {2009},
     pages = {1619-1633}}
    
  70. M. Kirchner & R. Böhme
    Synthesis of color filter array pattern in digital images
    Proceedings of SPIE
    2009, Vol. 7254, pp. 72540K
    BibTeX
    @inproceedings{Kirchner2009,
     author = {Matthias Kirchner and Rainer Böhme},
     title = {Synthesis of color filter array pattern in digital images},
     booktitle = {Proceedings of SPIE},
     year = {2009},
     volume = {7254},
     pages = {72540K}}
    
  71. M. Kirchner & T. Gloe
    On resampling detection in re-compressed images
    Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
    2009, pp. 21-25
    BibTeX
    @inproceedings{Kirchner2009a,
     author = {Kirchner, Matthias and Gloe, Thomas},
     title = {On resampling detection in re-compressed images},
     booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security},
     year = {2009},
     pages = {21--25}}
    
  72. S. Knight, S. Moschou & M. Sorell
    Forensics in Telecommunications, Information and Multimedia
    Sorell, M. (ed.)
    Forensics in Telecommunications, Information and Multimedia (Proceedings of the International Conference on Forensics in Telecommunications, Information and Multimedia)
    Chapter Analysis of Sensor Photo Response Non-Uniformity in RAW Images
    Springer, 2009, pp. 130-141
    BibTeX
    @inbook{Knight2009,
     author = {Knight, Simon and Moschou, Simon and Sorell, Matthew},
     title = {Forensics in Telecommunications, Information and Multimedia},
     booktitle = {Forensics in Telecommunications, Information and Multimedia (Proceedings of the International Conference on Forensics in Telecommunications, Information and Multimedia)},
     publisher = {Springer},
     year = {2009},
     pages = {130-141}}
    
  73. M. Kobayashi, T. Okabe & Y. Sato
    Detecting Video Forgeries Based on Noise Characteristics
    Wada, T., Huang, F. & Lin, S. (ed.)
    Advances in Image and Video Technology, Third Pacific Rim Symposium
    2009, pp. 306-317
    BibTeX
    @inproceedings{Kobayashi2009,
     author = {Kobayashi, Michihiro and Okabe, Takahiro and Sato, Yoichi},
     title = {Detecting Video Forgeries Based on Noise Characteristics},
     booktitle = {Advances in Image and Video Technology, Third Pacific Rim Symposium},
     year = {2009},
     pages = {306-317}}
    
  74. M. Konrad, H. Stögner & A. Uhl
    Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy
    Tistarelli, M. & Nixon, M. (ed.)
    Advances in Biometrics
    Springer Berlin Heidelberg, 2009, Vol. 5558, pp. 1091-1101
    BibTeX
    @incollection{Konrad2009,
     author = {Konrad, Mario and Stögner, Herbert and Uhl, Andreas},
     title = {Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy},
     booktitle = {Advances in Biometrics},
     publisher = {Springer Berlin Heidelberg},
     year = {2009},
     volume = {5558},
     pages = {1091-1101}}
    
  75. C.-L. Lai & Y.-S. Chen
    The application of intelligent system to digital image forensics
    Proc. Int Machine Learning and Cybernetics Conf
    2009, Vol. 5, pp. 2991-2998
    BibTeX
    @inproceedings{Lai2009,
     author = {Cheng-Liang Lai and Yi-Shiang Chen},
     title = {The application of intelligent system to digital image forensics},
     booktitle = {Proc. Int Machine Learning and Cybernetics Conf},
     year = {2009},
     volume = {5},
     pages = {2991--2998}}
    
  76. J.-F. Lalonde, A.A. Efros & S.G. Narasimhan
    Estimating natural illumination from a single outdoor image
    Proc. IEEE 12th Int Computer Vision Conf
    2009, pp. 183-190
    BibTeX
    @inproceedings{Lalonde2009,
     author = {Lalonde, J.-F. and Efros, A. A. and Narasimhan, S. G.},
     title = {Estimating natural illumination from a single outdoor image},
     booktitle = {Proc. IEEE 12th Int Computer Vision Conf},
     year = {2009},
     pages = {183--190}}
    
  77. F. Lefebvre, B. Chupeau, A. Massoudi & E. Diehl
    Image and Video Fingerprinting: Forensic Applications
    SPIE Conference on Media Forensics and Security
    2009
    BibTeX
    @inproceedings{Lefebvre2009,
     author = {Lefebvre, Frederic and Chupeau, Bertrand and Massoudi, Ayoub and Diehl, Eric},
     title = {Image and Video Fingerprinting: Forensic Applications},
     booktitle = {SPIE Conference on Media Forensics and Security},
     year = {2009}}
    
  78. A. Levin, Y. Weiss, F. Durand & W.T. Freeman
    Understanding and evaluating blind deconvolution algorithms
    Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009
    2009, pp. 1964-1971
    BibTeX
    @inproceedings{Levin2009,
     author = {Levin, A. and Weiss, Y. and Durand, F. and Freeman, W. T. },
     title = {Understanding and evaluating blind deconvolution algorithms},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009},
     year = {2009},
     pages = {1964--1971}}
    
  79. C.-T. Li
    Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
    Sorell, M. (ed.)
    Forensics in Telecommunications, Information and Multimedia
    Chapter Detection of Block Artifacts for Digital Forensic Analysis
    Springer Berlin Heidelberg, 2009, Vol. Volume 8, pp. 173-178
    BibTeX
    @inbook{Li2009a,
     author = {Li, Chang-Tsun},
     title = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
     booktitle = {Forensics in Telecommunications, Information and Multimedia},
     publisher = {Springer Berlin Heidelberg},
     year = {2009},
     volume = {Volume 8},
     pages = {173-178}}
    
  80. C.-T. Li
    Detection of Block Artifacts for Digital Forensic Analysis
    Sorell, M. (ed.)
    International Conference on Forensics in Telecommunications, Information and Multimedia
    2009, pp. 173-178
    BibTeX
    @inproceedings{Li2009g,
     author = {Li, Chang-Tsun},
     title = {Detection of Block Artifacts for Digital Forensic Analysis},
     booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia},
     year = {2009},
     pages = {173-178}}
    
  81. C.-T. Li
    Source camera linking using enhanced sensor pattern noise extracted from images
    IET Seminar Digests, IEE, 2009, Vol. 2009(2), pp. P46-P46
    BibTeX
    @article{Li2009b,
     author = {Chang-Tsun Li},
     title = {Source camera linking using enhanced sensor pattern noise extracted from images},
     journal = {IET Seminar Digests},
     publisher = {IEE},
     year = {2009},
     volume = {2009},
     number = {2},
     pages = {P46-P46}}
    
  82. C.-T. Li
    Source Camera Identification Using Enhanced Sensor Pattern Noise
    IEEE International Conference on Image Processing
    2009
    BibTeX
    @inproceedings{Li2009e,
     author = {Li, Chang-Tsun},
     title = {Source Camera Identification Using Enhanced Sensor Pattern Noise},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009}}
    
  83. C.-T. Li, C.-Y. Chang & Y. Li
    On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
    International Conference on Information Security and Digital Forensics
    2009, pp. 19-25
    BibTeX
    @inproceedings{Li2009h,
     author = {Li, Chang-Tsun and Chang, Chih-Yuan and Li, Yue},
     title = {On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise},
     booktitle = {International Conference on Information Security and Digital Forensics},
     year = {2009},
     pages = {19-25}}
    
  84. T. Li, M. He, N. Lei, C. Li & Q. Wang
    TDI CCD non-uniformity correction algorithm
    Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009
    2009, pp. 1483-1487
    BibTeX
    @inproceedings{Li2009f,
     author = {Tao Li and Mingyi He and Ning Lei and Chunmei Li and Qingyuan Wang},
     title = {TDI CCD non-uniformity correction algorithm},
     booktitle = {Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009},
     year = {2009},
     pages = {1483--1487}}
    
  85. W. Li, Y. Yuan & N. Yu
    Passive Detection of Doctored JPEG Image Via Block Artifact Grid Extraction
    IEEE Transactions on Signal Processing, 2009, Vol. 89(9), pp. 1821-1829
    BibTeX
    @article{Li2009c,
     author = {Li, Weihai and Yuan, Yuan and Yu, Nenghai},
     title = {Passive Detection of Doctored JPEG Image Via Block Artifact Grid Extraction},
     journal = {IEEE Transactions on Signal Processing},
     year = {2009},
     volume = {89},
     number = {9},
     pages = {1821-1829}}
    
  86. Y. Li & C.-T. Li
    Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis
    Sorell, M. (ed.)
    International Conference on Forensics in Telecommunications, Information and Multimedia
    2009, pp. 166-172
    BibTeX
    @inproceedings{Li2009d,
     author = {Li, Yue and Li, Chang-Tsun},
     title = {Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis},
     booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia},
     year = {2009},
     pages = {166-172}}
    
  87. Z. Li & J.-B. Zheng
    Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient
    Digital Watermarking, Springer-Verlag, 2009, Vol. 5450/2009, pp. 161-169
    BibTeX
    @article{Li2009,
     author = {Li, Zhe and Zheng, Jiang-Bin},
     title = {Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient},
     journal = {Digital Watermarking},
     publisher = {Springer-Verlag},
     year = {2009},
     volume = {5450/2009},
     pages = {161--169}}
    
  88. D.Y. Liliana & T. Basaruddin
    Image Fakery Detection Based on Singular Value Decomposition
    Makara Seri Sains, 2009, Vol. 13(2), pp. 180-184
    BibTeX
    @article{Liliana2009,
     author = {Liliana, Dewi Yanti and T. Basaruddin},
     title = {Image Fakery Detection Based on Singular Value Decomposition},
     journal = {Makara Seri Sains},
     year = {2009},
     volume = {13},
     number = {2},
     pages = {180-184}}
    
  89. H.-J. Lin, C.-W. Wang & Y.-T. Kao
    Fast copy-move forgery detection
    WSEAS Trans. Sig. Proc., World Scientific and Engineering Academy and Society (WSEAS), 2009, Vol. 5(5), pp. 188-197
    BibTeX
    @article{Lin2009,
     author = {Lin, Hwei-Jen and Wang, Chun-Wei and Kao, Yang-Ta},
     title = {Fast copy-move forgery detection},
     journal = {WSEAS Trans. Sig. Proc.},
     publisher = {World Scientific and Engineering Academy and Society (WSEAS)},
     year = {2009},
     volume = {5},
     number = {5},
     pages = {188--197}}
    
  90. H.-J. Lin, C.-W. Wang & Y.-T. Kao
    An Efficient Method for Copy-Move Forgery Detection
    Proceedings of the 8th WSEAS International Conference on Applied Computer and Applied Computational Science
    2009
    BibTeX
    @inproceedings{Lin2009a,
     author = {Lin, Hwei-Jen and Wang, Chun-Wei and Kao, Yang-Ta},
     title = {An Efficient Method for Copy-Move Forgery Detection},
     booktitle = {Proceedings of the 8th WSEAS International Conference on Applied Computer and Applied Computational Science},
     year = {2009}}
    
  91. T.-k. Lin & C.-L. Huang
    Digital Image Forensics Using EM Algorithm
    Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M. & Tang, X. (ed.)
    Advances in Multimedia Information Processing - PCM 2009
    Springer Berlin / Heidelberg, 2009, Vol. 5879, pp. 994-998
    BibTeX
    @incollection{Lin2009c,
     author = {Lin, Tim-kun and Huang, Chung-Lin},
     title = {Digital Image Forensics Using EM Algorithm},
     booktitle = {Advances in Multimedia Information Processing - PCM 2009},
     publisher = {Springer Berlin / Heidelberg},
     year = {2009},
     volume = {5879},
     pages = {994-998}}
    
  92. W.S. Lin, S. Tjoa, H.V. Zhao & K.J.R. Liu
    Digital Image Source Coder Forensics via Intrinsic Fingerprints
    IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(3), pp. 460-475
    BibTeX
    @article{Lin2009e,
     author = {Lin, W. Sabrina and Tjoa, Steven and Zhao, H. Vicky and Liu, K. J. Ray},
     title = {Digital Image Source Coder Forensics via Intrinsic Fingerprints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2009},
     volume = {4},
     number = {3},
     pages = {460-475}}
    
  93. Z. Lin, J. He, X. Tang & C.-K. Tang
    Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
    Pattern Recognition, 2009, Vol. 42(11), pp. 2492 - 2501
    BibTeX
    @article{Lin2009b,
     author = {Zhouchen Lin and Junfeng He and Xiaoou Tang and Chi-Keung Tang},
     title = {Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis},
     journal = {Pattern Recognition},
     year = {2009},
     volume = {42},
     number = {11},
     pages = {2492 - 2501}}
    
  94. Q. Liu & A.H. Sung
    A new approach for JPEG resize and image splicing detection
    MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics
    ACM, 2009, pp. 43-48
    BibTeX
    @inproceedings{Liu2009,
     author = {Liu, Qingzhong and Sung, Andrew H.},
     title = {A new approach for JPEG resize and image splicing detection},
     booktitle = {MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics},
     publisher = {ACM},
     year = {2009},
     pages = {43--48}}
    
  95. Y.-D. Lu, X.-J. Shen, H.-P. Chen & Y.-W. Wang
    Blind identification for digital images based on inconsistency of illuminant direction
    Journal of Jilin University
    2009, Vol. 27(3), pp. 293-298
    BibTeX
    @inproceedings{Lu2009,
     author = {Lu, Ying-Da and Shen, Xuan-Jing and Chen, Hai-Peng and Wang, You-Wei},
     title = {Blind identification for digital images based on inconsistency of illuminant direction},
     booktitle = {Journal of Jilin University},
     year = {2009},
     volume = {27},
     number = {3},
     pages = {293-298}}
    
  96. W. Luo, J. Huang & G. Qiu
    A Novel Method for Block Size Forensics Based on Morphological Operations
    Lecture Notes In Computer Science, Springer-Verlag, 2009, Vol. 5450/2009, pp. 229-239
    BibTeX
    @article{Luo2009,
     author = {Luo, Weiqi and Huang, Jiwu and Qiu, Guoping},
     title = {A Novel Method for Block Size Forensics Based on Morphological Operations},
     journal = {Lecture Notes In Computer Science},
     publisher = {Springer-Verlag},
     year = {2009},
     volume = {5450/2009},
     pages = {229--239}}
    
  97. Y. Lv, X. Shen & H. Chen
    Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction
    Proc. Int. Conf. Information Engineering and Computer Science ICIECS 2009
    2009, pp. 1-5
    BibTeX
    @inproceedings{Lv2009,
     author = {Yingda Lv and Xuanjing Shen and Haipeng Chen},
     title = {Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction},
     booktitle = {Proc. Int. Conf. Information Engineering and Computer Science ICIECS 2009},
     year = {2009},
     pages = {1--5}}
    
  98. B. Mahdian & S. Saic
    Detection and description of geometrically transformed digital images
    Delp, E. J., Dittmann, J., Memon, N. D. & Wong, P. W. (ed.)
    Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI
    2009, Vol. 7254, pp. 72540J
    BibTeX
    @inproceedings{Mahdian2009,
     author = {Babak Mahdian and Stanislav Saic},
     title = {Detection and description of geometrically transformed digital images},
     booktitle = {Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI},
     year = {2009},
     volume = {7254},
     pages = {72540J}}
    
  99. B. Mahdian & S. Saic
    A Cyclostationarity Analysis Applied to Scaled Images
    Leung C.S., Lee M., C. J. (ed.)
    International Conference on Neural Information Processing (ICONIP 2009)
    2009, Vol. 16
    BibTeX
    @inproceedings{Mahdian2009d,
     author = {Babak Mahdian and Stanislav Saic},
     title = {A Cyclostationarity Analysis Applied to Scaled Images},
     booktitle = {International Conference on Neural Information Processing (ICONIP 2009)},
     year = {2009},
     volume = {16}}
    
  100. B. Mahdian & S. Saic
    Using noise inconsistencies for blind image forensics
    Image and Vision Computing, 2009, Vol. 27, pp. 1497-1503
    BibTeX
    @article{Mahdian2009a,
     author = {Mahdian, Babak and Saic, Stanislav},
     title = {Using noise inconsistencies for blind image forensics},
     journal = {Image and Vision Computing},
     year = {2009},
     volume = {27},
     pages = {1497--1503}}
    
  101. B. Mahdian & S. Saic
    A cyclostationarity analysis applied to image forensics
    Proc. Workshop Applications of Computer Vision (WACV)
    2009, pp. 1-6
    BibTeX
    @inproceedings{Mahdian2009b,
     author = {Mahdian, B. and Saic, S.},
     title = {A cyclostationarity analysis applied to image forensics},
     booktitle = {Proc. Workshop Applications of Computer Vision (WACV)},
     year = {2009},
     pages = {1--6}}
    
  102. B. Mahdian & S. Saic
    Detecting double compressed JPEG images
    Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf
    2009, pp. 1-6
    BibTeX
    @inproceedings{Mahdian2009c,
     author = {Mahdian, Babak and Saic, Stanislav},
     title = {Detecting double compressed JPEG images},
     booktitle = {Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf},
     year = {2009},
     pages = {1--6}}
    
  103. J. Mao, O. Bulan, G. Sharma & S. Datta
    Device Temporal Forensics: An Information Theoretic Approach
    IEEE International Conference on Image Processing
    2009, pp. 1501-1504
    BibTeX
    @inproceedings{Mao2009,
     author = {Mao, Junwen and Bulan, Orhan and Sharma, Gaurav and Datta, Suprakash},
     title = {Device Temporal Forensics: An Information Theoretic Approach},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {1501-1504}}
    
  104. K. Matsushita & H. Kitazawa
    An improved camera identification method based on the texture complexity and the image restoration
    Proceedings of the 2009 International Conference on Hybrid Information Technology
    ACM, 2009, Vol. 3(1), pp. 171-175
    BibTeX
    @inproceedings{Matsushita2009,
     author = {Matsushita, Kazuya and Kitazawa, Hitoshi},
     title = {An improved camera identification method based on the texture complexity and the image restoration},
     booktitle = {Proceedings of the 2009 International Conference on Hybrid Information Technology},
     publisher = {ACM},
     year = {2009},
     volume = {3},
     number = {1},
     pages = {171--175}}
    
  105. G. Messina
    Presented to Interpol Crime Against Children Group
    Interpol Crime Against Children Group, Lyon, 25 March 2009
    2009
    BibTeX
    @conference{Messina2009,
     author = {Messina, Giuseppe},
     title = {Presented to Interpol Crime Against Children Group},
     booktitle = {Interpol Crime Against Children Group, Lyon, 25 March 2009},
     year = {2009}}
    
  106. S.Z.B. Mohd Shaid
    Estimating Optimal Block Size for Copy-Move Attack Detection on Highly Textured Image
    UNIVERSITI TEKNOLOGI MALAYSIA, 2009
    BibTeX
    @mastersthesis{MohdShaid2009,
     author = {Mohd Shaid, Syed Zainudeen Bin},
     title = {Estimating Optimal Block Size for Copy-Move Attack Detection on Highly Textured Image},
     school = {UNIVERSITI TEKNOLOGI MALAYSIA},
     year = {2009}}
    
  107. L. Nataraj, A. Sarkar & B.S. Manjunath
    Adding Gaussian Noise to "Denoise" JPEG for detecting Image Resizing
    Proceedings of the International Conference on Image Processing 2009, Cairo, Egypt9
    2009, pp. 1493-1496
    BibTeX
    @inproceedings{Nataraj2009,
     author = {Lakshmanan Nataraj and Anindya Sarkar and B. S. Manjunath},
     title = {Adding Gaussian Noise to "Denoise" JPEG for detecting Image Resizing},
     booktitle = {Proceedings of the International Conference on Image Processing 2009, Cairo, Egypt9},
     year = {2009},
     pages = {1493--1496}}
    
  108. T.-T. Ng
    Camera response function signature for digital forensics --- Part II: Signature extraction
    Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
    2009, pp. 161-165
    BibTeX
    @inproceedings{Ng2009a,
     author = {Tian-Tsong Ng},
     title = {Camera response function signature for digital forensics --- Part II: Signature extraction},
     booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security},
     year = {2009},
     pages = {161--165}}
    
  109. T.-T. Ng & S.-F. Chang
    Identifying and prefiltering images
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 49-58
    BibTeX
    @article{Ng2009b,
     author = {Tian-Tsong Ng and Shih-Fu Chang},
     title = {Identifying and prefiltering images},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {49--58}}
    
  110. T.-T. Ng & M.-P. Tsui
    Camera response function signature for digital forensics --- Part I: Theory and data selection
    Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
    2009, pp. 156-160
    BibTeX
    @inproceedings{Ng2009,
     author = {Tian-Tsong Ng and Mao-Pei Tsui},
     title = {Camera response function signature for digital forensics --- Part I: Theory and data selection},
     booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security},
     year = {2009},
     pages = {156--160}}
    
  111. D. Parrish & B. Noonan
    Image Manipulation as Research Misconduct
    Science and Engineering Ethics, Springer Netherlands, 2009, Vol. 15, pp. 161-167
    BibTeX
    @article{Parrish2009,
     author = {Parrish, Debra and Noonan, Bridget},
     title = {Image Manipulation as Research Misconduct},
     journal = {Science and Engineering Ethics},
     publisher = {Springer Netherlands},
     year = {2009},
     volume = {15},
     pages = {161-167}}
    
  112. Z. Qu, G. Qiu & J. Huang
    Detect Digital Image Splicing with Visual Cues
    Katzenbeisser, S. & Sadeghi, A.-R. (ed.)
    International Workshop on Information Hiding
    2009, pp. 247-261
    BibTeX
    @inproceedings{Qu2009,
     author = {Qu, Zhenhua and Qiu, Guoping and Huang, Jiwu},
     title = {Detect Digital Image Splicing with Visual Cues},
     booktitle = {International Workshop on Information Hiding},
     year = {2009},
     pages = {247-261}}
    
  113. K. Rosenfeld & H.T. Sencar
    A Study of the Robustness of PRNU-Based Camera Identification
    Delp, E. J., Dittmann, J., Memon, N. & Wong, P. W. (ed.)
    SPIE Conference on Media Forensics and Security
    2009
    BibTeX
    @inproceedings{Rosenfeld2009,
     author = {Rosenfeld, Kurt and Sencar, Husrev T.},
     title = {A Study of the Robustness of PRNU-Based Camera Identification},
     booktitle = {SPIE Conference on Media Forensics and Security},
     year = {2009}}
    
  114. G. Sankar, H.V. Zhao & Y.-H. Yang
    Feature Based Classification of Computer Graphics and Real Images
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2009, pp. 1513-1516
    BibTeX
    @inproceedings{Sankar2009,
     author = {Sankar, Gopinath and Zhao, H. Vicky and Yang, Yee-Hong},
     title = {Feature Based Classification of Computer Graphics and Real Images},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2009},
     pages = {1513-1516}}
    
  115. A. Sarkar, L. Nataraj & B.S. Manjunath
    Detection of seam carving and localization of seam insertions in digital images
    MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security
    ACM, 2009, pp. 107-116
    BibTeX
    @inproceedings{Sarkar2009,
     author = {Sarkar, Anindya and Nataraj, Lakshmanan and Manjunath, B. S.},
     title = {Detection of seam carving and localization of seam insertions in digital images},
     booktitle = {MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2009},
     pages = {107--116}}
    
  116. H.T. Sencar & N. Memon
    Identification and recovery of JPEG files with missing fragments
    Digital Investigation , 2009, Vol. 6, Supplement(0), pp. S88 - S98
    BibTeX
    @article{Sencar2009,
     author = {Husrev T. Sencar and Nasir Memon},
     title = {Identification and recovery of JPEG files with missing fragments },
     journal = {Digital Investigation },
     year = {2009},
     volume = {6, Supplement},
     number = {0},
     pages = {S88 - S98}}
    
  117. S. Senpathi
    Detection of manipulated images
    Wichita State University, 2009
    BibTeX
    @mastersthesis{Senpathi2009,
     author = {Senpathi, Santoshi},
     title = {Detection of manipulated images},
     school = {Wichita State University},
     year = {2009}}
    
  118. T. Shahid & A. Bin Mansoor
    Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric
    International Journal of Recent Trends in Engineering,, 2009, Vol. 2(2), pp. 159-161
    BibTeX
    @article{Shahid2009,
     author = {Shahid, Tehseen and Bin Mansoor, Atif},
     title = {Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric},
     journal = {International Journal of Recent Trends in Engineering,},
     year = {2009},
     volume = {2},
     number = {2},
     pages = {159--161}}
    
  119. C. Shengbing, C. Zuguo, H. Qiangbo & Y. Shaojun
    Image Self-Embedding Technology Research Based on Discrete Cosine Transform
    Proc. Int. Conf. Networks Security, Wireless Communications and Trusted Computing NSWCTC ´09
    2009, Vol. 1, pp. 42-46
    BibTeX
    @inproceedings{Shengbing2009,
     author = {Che Shengbing and Che Zuguo and Huang Qiangbo and Yu Shaojun},
     title = {Image Self-Embedding Technology Research Based on Discrete Cosine Transform},
     booktitle = {Proc. Int. Conf. Networks Security, Wireless Communications and Trusted Computing NSWCTC ´09},
     year = {2009},
     volume = {1},
     pages = {42--46}}
    
  120. M. Stamm & K.J.R. Liu
    Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms
    Proc. APSIPA Annual Summit and Conference
    2009
    BibTeX
    @inproceedings{Stamm2009,
     author = {Stamm, Matthew and Liu, K. J. Ray},
     title = {Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms},
     booktitle = {Proc. APSIPA Annual Summit and Conference},
     year = {2009}}
    
  121. P. Sutthiwan, X. Cai, Y.Q. Shi & H. Zhang
    Computer Graphics Classification Based on Markov Process Model and Boosting Feature Selection Technique
    IEEE International Conference on Image Processing
    2009, pp. 2913-2916
    BibTeX
    @inproceedings{Sutthiwan2009a,
     author = {Sutthiwan, Patchara and Cai, Xiao and Shi, Yun Qing and Zhang, Hong},
     title = {Computer Graphics Classification Based on Markov Process Model and Boosting Feature Selection Technique},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {2913-2916}}
    
  122. P. Sutthiwan, J. Ye & Y.Q. Shi
    An Enhanced Statistical Approach to Identifying Photorealistic Images
    Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
    International Workshop on Digital Watermarking
    2009, pp. 323-335
    BibTeX
    @inproceedings{Sutthiwan2009,
     author = {Sutthiwan, Patchara and Ye, Jingyu and Shi, Yun Qing},
     title = {An Enhanced Statistical Approach to Identifying Photorealistic Images},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2009},
     pages = {323-335}}
    
  123. A. Swaminathan, M. Wu & K.J.R. Liu
    Component forensics
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 38-48
    BibTeX
    @article{Swaminathan2009,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {Component forensics},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {38--48}}
    
  124. M. Tagliasacchi, G. Valenzise & S. Tubaro
    Hash-Based Identification of Sparse Image Tampering
    IEEE Transactions on Image Processing, 2009, Vol. 18(11), pp. 2491-2504
    BibTeX
    @article{Tagliasacchi2009,
     author = {Tagliasacchi, Marco and Valenzise, Giuseppe and Tubaro, Stefano },
     title = {Hash-Based Identification of Sparse Image Tampering},
     journal = {IEEE Transactions on Image Processing},
     year = {2009},
     volume = {18},
     number = {11},
     pages = {2491--2504}}
    
  125. Z. Ting & W.R. ding
    Copy-Move Forgery Detection Based on SVD in Digital Image
    Proc. 2nd Int. Congress Image and Signal Processing CISP ´09
    2009, pp. 1-5
    BibTeX
    @inproceedings{Ting2009a,
     author = {Zhang Ting and Wang Rang-ding},
     title = {Copy-Move Forgery Detection Based on SVD in Digital Image},
     booktitle = {Proc. 2nd Int. Congress Image and Signal Processing CISP ´09},
     year = {2009},
     pages = {1--5}}
    
  126. Z. Ting & W. Rangding
    Doctored JPEG image detection based on double compression features analysis
    Proc. ISECS Int. Colloquium Computing, Communication, Control, and Management CCCM 2009
    2009, Vol. 2, pp. 76-80
    BibTeX
    @inproceedings{Ting2009b,
     author = {Zhang Ting and Wang Rangding},
     title = {Doctored JPEG image detection based on double compression features analysis},
     booktitle = {Proc. ISECS Int. Colloquium Computing, Communication, Control, and Management CCCM 2009},
     year = {2009},
     volume = {2},
     pages = {76--80}}
    
  127. Z. Ting & W. Rang-ding
    Copy-Move Forgery Detection Based on SVD in Digital Image
    Proc. 2nd Int. Congress Image and Signal Processing CISP ´09
    2009, pp. 1-5
    BibTeX
    @inproceedings{Ting2009,
     author = {Ting, Zhang and Rang-ding, Wang},
     title = {Copy-Move Forgery Detection Based on SVD in Digital Image},
     booktitle = {Proc. 2nd Int. Congress Image and Signal Processing CISP ´09},
     year = {2009},
     pages = {1--5}}
    
  128. J. Toriwaki & H. Yoshida
    Fundamentals of Three-Dimensional Digital Image Processing
    Springer, 2009
    BibTeX
    @book{Toriwaki2009,
     author = {Junichiro Toriwaki and Hiroyuki Yoshida},
     title = {Fundamentals of Three-Dimensional Digital Image Processing},
     publisher = {Springer},
     year = {2009}}
    
  129. R. Tortorella
    Richard Tortorella
    NARCAP, 2009
    BibTeX
    @techreport{Tortorella2009,
     author = {Richard Tortorella},
     title = {Richard Tortorella},
     year = {2009}}
    
  130. M.-J. Tsai, C.-S. Wang & J. Liu
    A Hybrid Model for Digital Camera Source Identification
    IEEE International Conference on Image Processing
    2009, pp. 2901-2904
    BibTeX
    @inproceedings{Tsai2009,
     author = {Tsai, Min-Jen and Wang, Cheng-Sheng and Liu, Jung},
     title = {A Hybrid Model for Digital Camera Source Identification},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {2901-2904}}
    
  131. W. Van Houten & Z.J. Geradts
    Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube
    Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
    International Workshop on Computational Forensics
    2009, pp. 104-115
    BibTeX
    @inproceedings{VanHouten2009a,
     author = {Van Houten, Wiger and Geradts, Zeno J.},
     title = {Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube},
     booktitle = {International Workshop on Computational Forensics},
     year = {2009},
     pages = {104-115}}
    
  132. W. Van Houten & Z.J. Geradts
    Source Video Camera Identification for Multiply Compressed Videos Originating from YouTube
    Digital Investigation, 2009, Vol. 6(1-2), pp. 48-60
    BibTeX
    @article{VanHouten2009,
     author = {Van Houten, Wiger and Geradts, Zeno J.},
     title = {Source Video Camera Identification for Multiply Compressed Videos Originating from YouTube},
     journal = {Digital Investigation},
     year = {2009},
     volume = {6},
     number = {1-2},
     pages = {48-60}}
    
  133. E.E. Varsaki, V. Fotopoulos & A.N. Skodras
    Self-authentication of natural color images in Pascal transform domain
    DSP´09: Proceedings of the 16th international conference on Digital Signal Processing
    IEEE Press, 2009, pp. 1068-1073
    BibTeX
    @inproceedings{Varsaki2009,
     author = {Varsaki, E. E. and Fotopoulos, V. and Skodras, A. N.},
     title = {Self-authentication of natural color images in Pascal transform domain},
     booktitle = {DSP´09: Proceedings of the 16th international conference on Digital Signal Processing},
     publisher = {IEEE Press},
     year = {2009},
     pages = {1068--1073}}
    
  134. B. Wang, Y. Guo, X. Kong & F. Meng
    Source Camera Identification Forensics Based on Wavelet Features
    Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09.
    2009, pp. 702-705
    BibTeX
    @inproceedings{Wang2009h,
     author = {Bo Wang and Yiping Guo and Xiangwei Kong and Fanjie Meng},
     title = {Source Camera Identification Forensics Based on Wavelet Features},
     booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09.},
     year = {2009},
     pages = {702--705}}
    
  135. B. Wang, X. Kong & X. You
    Source Camera Identification Using Support Vector Machines
    Advances in Digital Forensics V
    2009, pp. 107-118
    BibTeX
    @inproceedings{Wang2009e,
     author = {Wang, Bo and Kong, Xiangwei and You, Xingang},
     title = {Source Camera Identification Using Support Vector Machines},
     booktitle = {Advances in Digital Forensics V},
     year = {2009},
     pages = {107-118}}
    
  136. G. Wang, H.-T. Tsui & Q.M. Jonathan Wu
    What can we learn about the scene structure from three orthogonal vanishing points in images
    Pattern Recogn. Lett., Elsevier Science Inc., 2009, Vol. 30(3), pp. 192-202
    BibTeX
    @article{Wang2009d,
     author = {Wang, Guanghui and Tsui, Hung-Tat and Jonathan Wu, Q. M.},
     title = {What can we learn about the scene structure from three orthogonal vanishing points in images},
     journal = {Pattern Recogn. Lett.},
     publisher = {Elsevier Science Inc.},
     year = {2009},
     volume = {30},
     number = {3},
     pages = {192--202}}
    
  137. J. Wang, B.-H. Cha, S.-H. Cho & C.C.J. Kuo
    Understanding Benford´s Law and its Vulnerability in Image Forensics
    IEEE International Conference on Multimedia and Expo
    2009, pp. 1568-1571
    BibTeX
    @inproceedings{Wang2009j,
     author = {Wang, Jingwei and Cha, Byung-Ho and Cho, Seong-Ho and Kuo, C. -C. Jay},
     title = {Understanding Benford´s Law and its Vulnerability in Image Forensics},
     booktitle = {IEEE International Conference on Multimedia and Expo},
     year = {2009},
     pages = {1568-1571}}
    
  138. J. Wang, G. Liu, H. Li, Y. Dai & Z. Wang
    Detection of Image Region Duplication Forgery Using Model with Circle Block
    Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09
    2009, Vol. 1, pp. 25-29
    BibTeX
    @inproceedings{Wang2009,
     author = {Junwen Wang and Guangjie Liu and Hongyuan Li and Yuewei Dai and Zhiquan Wang},
     title = {Detection of Image Region Duplication Forgery Using Model with Circle Block},
     booktitle = {Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09},
     year = {2009},
     volume = {1},
     pages = {25--29}}
    
  139. R. Wang & X. Ping
    Detection of Resampling Based on Singular Value Decomposition
    Proc. Fifth Int. Conf. Image and Graphics ICIG ´09
    2009, pp. 879-884
    BibTeX
    @inproceedings{Wang2009a,
     author = {Ran Wang and Xijian Ping},
     title = {Detection of Resampling Based on Singular Value Decomposition},
     booktitle = {Proc. Fifth Int. Conf. Image and Graphics ICIG ´09},
     year = {2009},
     pages = {879--884}}
    
  140. W. Wang
    Digital Video Forensics
    Department of Computer Science, Dartmouth College, 2009
    BibTeX
    @phdthesis{Wang2009i,
     author = {Wang, Weihong},
     title = {Digital Video Forensics},
     school = {Department of Computer Science, Dartmouth College},
     year = {2009}}
    
  141. W. Wang, J. Dong & T. Tan
    A Survey of Passive Image Tampering Detection
    Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
    International Workshop on Digital Watermarking
    2009, pp. 308-322
    BibTeX
    @inproceedings{Wang2009g,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {A Survey of Passive Image Tampering Detection},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2009},
     pages = {308-322}}
    
  142. W. Wang, J. Dong & T. Tan
    Effective image splicing detection based on image chroma
    ICIP´09: Proceedings of the 16th IEEE international conference on Image processing
    IEEE Press, 2009, pp. 1249-1252
    BibTeX
    @inproceedings{Wang2009c,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Effective image splicing detection based on image chroma},
     booktitle = {ICIP´09: Proceedings of the 16th IEEE international conference on Image processing},
     publisher = {IEEE Press},
     year = {2009},
     pages = {1249--1252}}
    
  143. W. Wang & H. Farid
    Exposing Digital Forgeries in Video by Detecting Double Quantization
    ACM Multimedia and Security Workshop
    2009, pp. 39-48
    BibTeX
    @inproceedings{Wang2009f,
     author = {Wang, Weihong and Farid, Hany},
     title = {Exposing Digital Forgeries in Video by Detecting Double Quantization},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2009},
     pages = {39-48}}
    
  144. X. Wang, B. Xuan & S.-L. Peng
    Detection of copy-transform-move forgery in color digital image
    Jisuanji Gongcheng / Computer Engineering, 2009, Vol. 35(16), pp. 20-22
    BibTeX
    @article{Wang2009b,
     author = {Wang, Xin and Xuan, Bo and Peng, Si-Long},
     title = {Detection of copy-transform-move forgery in color digital image},
     journal = {Jisuanji Gongcheng / Computer Engineering},
     year = {2009},
     volume = {35},
     number = {16},
     pages = {20-22}}
    
  145. P. Wendykier
    High Performance Java Software for Image Processing
    Emory University, 2009
    BibTeX
    @phdthesis{Wendykier2009,
     author = {Wendykier, Piotr},
     title = {High Performance Java Software for Image Processing},
     school = {Emory University},
     year = {2009}}
    
  146. Y. Wu, X. Kong, X. You & Y. Guo
    Printer Forensics Based on Page Document´s Geometric Distortion
    IEEE International Conference on Image Processing
    2009, pp. 2909-2912
    BibTeX
    @inproceedings{Wu2009,
     author = {Wu, Yubao and Kong, Xiangwei and You, Xingang and Guo, Yiping},
     title = {Printer Forensics Based on Page Document´s Geometric Distortion},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {2909-2912}}
    
  147. G. Xu, S. Gao, Y.Q. Shi, R. Hu & W. Su
    Camera-Model Identification Using Markovian Transition Probability Matrix
    Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
    International Workshop on Digital Watermarking
    2009, pp. 294-307
    BibTeX
    @inproceedings{Xu2009a,
     author = {Xu, Guanshuo and Gao, Shang and Shi, Yun Qing and Hu, RuiMin and Su, Wei},
     title = {Camera-Model Identification Using Markovian Transition Probability Matrix},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2009},
     pages = {294-307}}
    
  148. G. Xu, Y.Q. Shi & W. Su
    Camera brand and model identification using moments of 1-D and 2-D characteristic functions
    Proc. 16th IEEE Int Image Processing (ICIP) Conf
    2009, pp. 2917-2920
    BibTeX
    @inproceedings{Xu2009,
     author = {Guanshuo Xu and Yun Qing Shi and Wei Su},
     title = {Camera brand and model identification using moments of 1-D and 2-D characteristic functions},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf},
     year = {2009},
     pages = {2917--2920}}
    
  149. Q.-C. Yang & C.-L. Huang
    Copy-Move Forgery Detection in Digital Image
    PCM ´09: Proceedings of the 10th Pacific Rim Conference on Multimedia
    Springer-Verlag, 2009, pp. 816-825
    BibTeX
    @inproceedings{Yang2009,
     author = {Yang, Qing-Chu and Huang, Chung-Lin},
     title = {Copy-Move Forgery Detection in Digital Image},
     booktitle = {PCM ´09: Proceedings of the 10th Pacific Rim Conference on Multimedia},
     publisher = {Springer-Verlag},
     year = {2009},
     pages = {816--825}}
    
  150. R. Yang, Y.Q. Shi & J. Huang
    Defeating Fake-Quality MP3
    ACM Proceedings of the Multimedia and Security Workshop
    2009, pp. 117-124
    BibTeX
    @inproceedings{Yang2009a,
     author = {Yang, Rui and Shi, Yun Qing and Huang, Jiwu},
     title = {Defeating Fake-Quality MP3},
     booktitle = {ACM Proceedings of the Multimedia and Security Workshop},
     year = {2009},
     pages = {117-124}}
    
  151. K.-H. Yap, L. Guan, S.W. Perry & H.S. Wong
    Adaptive Image Processing: A Computational Intelligence Perspective
    Laplante, P. A. (ed.)
    CRC Press, 2009
    BibTeX
    @book{Yap2009,
     author = {Kim-Hui Yap and Ling Guan and Stuart William Perry and Hau San Wong},
     title = {Adaptive Image Processing: A Computational Intelligence Perspective},
     publisher = {CRC Press},
     year = {2009}}
    
  152. C. Zhang & H. Zhang
    Digital Camera Identification Based on Curvelet Transform
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2009, pp. 1389-1392
    BibTeX
    @inproceedings{Zhang2009e,
     author = {Zhang, Chi and Zhang, Hongbin},
     title = {Digital Camera Identification Based on Curvelet Transform},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2009},
     pages = {1389-1392}}
    
  153. J. Zhang & Y. Su
    Detecting logo-removal forgery by inconsistencies of blur
    Proc. Int. Conf. Industrial Mechatronics and Automation ICIMA 2009
    2009, pp. 32-36
    BibTeX
    @inproceedings{Zhang2009d,
     author = {Jing Zhang and Yuting Su},
     title = {Detecting logo-removal forgery by inconsistencies of blur},
     booktitle = {Proc. Int. Conf. Industrial Mechatronics and Automation ICIMA 2009},
     year = {2009},
     pages = {32--36}}
    
  154. J. Zhang, Y. Su & M. Zhang
    Exposing Digital Video Forgery by Ghost Shadow Artifact
    ACM Workshop on Multimedia in Forensics
    2009, pp. 49-54
    BibTeX
    @inproceedings{Zhang2009g,
     author = {Zhang, Jing and Su, Yuting and Zhang, Mingyu},
     title = {Exposing Digital Video Forgery by Ghost Shadow Artifact},
     booktitle = {ACM Workshop on Multimedia in Forensics},
     year = {2009},
     pages = {49-54}}
    
  155. J. Zhang, H. Wang & Y. Su
    Detection of Double-Compression in JPEG2000 Images for Application in Image Forensics
    Journal of Multimedia, 2009, Vol. 4(6), pp. 379-388
    BibTeX
    @article{Zhang2009f,
     author = {Jing Zhang and Haiying Wang and Yuting Su},
     title = {Detection of Double-Compression in JPEG2000 Images for Application in Image Forensics},
     journal = {Journal of Multimedia},
     year = {2009},
     volume = {4},
     number = {6},
     pages = {379-388}}
    
  156. J. Zhang, Y. Zhao & Y. Su
    A new approach merging markov and DCT features for image splicing detection
    Proc. IEEE Int. Conf. Intelligent Computing and Intelligent Systems ICIS 2009
    2009, Vol. 4, pp. 390-394
    BibTeX
    @inproceedings{Zhang2009b,
     author = {Jing Zhang and Yun Zhao and Yuting Su},
     title = {A new approach merging markov and DCT features for image splicing detection},
     booktitle = {Proc. IEEE Int. Conf. Intelligent Computing and Intelligent Systems ICIS 2009},
     year = {2009},
     volume = {4},
     pages = {390--394}}
    
  157. P. Zhang & X. Kong
    Detecting Image Tampering Using Feature Fusion
    Proc. Int. Conf. Availability, Reliability and Security ARES ´09
    2009, pp. 335-340
    BibTeX
    @inproceedings{Zhang2009a,
     author = {Pin Zhang and Xiangwei Kong},
     title = {Detecting Image Tampering Using Feature Fusion},
     booktitle = {Proc. Int. Conf. Availability, Reliability and Security ARES ´09},
     year = {2009},
     pages = {335--340}}
    
  158. W. Zhang, X. Cao, Z. Feng, J. Zhang & P. Wang
    Detecting photographic composites using two-view geometrical constraints
    Proc. IEEE Int. Conf. Multimedia and Expo ICME 2009
    2009, pp. 1078-1081
    BibTeX
    @inproceedings{Zhang2009c,
     author = {Wei Zhang and Xiaochun Cao and Zhiyong Feng and Jiawan Zhang and Ping Wang},
     title = {Detecting photographic composites using two-view geometrical constraints},
     booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo ICME 2009},
     year = {2009},
     pages = {1078--1081}}
    
  159. W. Zhang, X. Cao, J. Zhang, J. Zhu & P. Wang
    Detecting photographic composites using shadows
    Proc. IEEE International Conference on Multimedia and Expo ICME 2009
    2009, pp. 1042-1045
    BibTeX
    @inproceedings{Zhang2009,
     author = {Zhang, Wei and Cao, Xiaochun and Zhang, Jiawan and Zhu, Jigui and Wang, Ping},
     title = {Detecting photographic composites using shadows},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo ICME 2009},
     year = {2009},
     pages = {1042--1045}}
    
  160. X. Zhao, A.T.S. Ho & Y.Q. Shi
    Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images
    Proc. 16th Int Digital Signal Processing Conf
    2009, pp. 1-8
    BibTeX
    @inproceedings{Zhao2009,
     author = {Xi Zhao and Ho, A. T. S. and Shi, Y. Q.},
     title = {Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images},
     booktitle = {Proc. 16th Int Digital Signal Processing Conf},
     year = {2009},
     pages = {1--8}}
    
  161. J. Zheng & M. Liu
    A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering
    Lecture Notes In Computer Science, Springer-Verlag, 2009, Vol. 5450, pp. 152-160
    BibTeX
    @article{Zheng2009,
     author = {Zheng, Jiangbin and Liu, Miao},
     title = {A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering},
     journal = {Lecture Notes In Computer Science},
     publisher = {Springer-Verlag},
     year = {2009},
     volume = {5450},
     pages = {152--160}}
    
  162. D. Zoran & Y. Weiss
    Scale invariance and noise in natural images
    Proc. IEEE 12th Int Computer Vision Conf
    2009, pp. 2209-2216
    BibTeX
    @inproceedings{Zoran2009,
     author = {Zoran, D. and Weiss, Y. },
     title = {Scale invariance and noise in natural images},
     booktitle = {Proc. IEEE 12th Int Computer Vision Conf},
     year = {2009},
     pages = {2209--2216}}
    
  163. I. van Zyl Marais & W.H. Steyn
    A fast parallel algorithm for blind estimation of noise variance
    University of Stellenbosch, 2009
    BibTeX
    @techreport{ZylMarais2009,
     author = {Izak van Zyl Marais and Willem Herman Steyn},
     title = {A fast parallel algorithm for blind estimation of noise variance},
     year = {2009}}
    
  164. Computational Forensics
    Geradts, Z. J. M. H., Franke, K. Y. & (Eds.), C. J. V. (ed.)
    Springer, 2009, Vol. 5718
    BibTeX
    @proceedings{Geradts2009,,
     title = {Computational Forensics},
     publisher = {Springer},
     year = {2009},
     volume = {5718}}
    
  165. Multimedia Forensics and Security
    Li, C.-T. (ed.)
    Hershey, New York, 2009
    BibTeX
    @book{Li2009i,,
     title = {Multimedia Forensics and Security},
     publisher = {Hershey, New York},
     year = {2009}}
    
  166. Forensics in Telecommunications, Information and Multimedia
    Sorell, M. (ed.)
    Springer, 2009
    @book{Sorell2009,,
     title = {Forensics in Telecommunications, Information and Multimedia},
     publisher = {Springer},
     year = {2009}}
    


2008

  1. R. Achanta, F. Estrada, P. Wils & S. Süsstrunk
    Salient region detection and segmentation
    ICVS´08: Proceedings of the 6th international conference on Computer vision systems
    Springer-Verlag, 2008, pp. 66-75
    BibTeX
    @inproceedings{Achanta2008,
     author = {Achanta, Radhakrishna and Estrada, Francisco and Wils, Patricia and Süsstrunk, Sabine},
     title = {Salient region detection and segmentation},
     booktitle = {ICVS´08: Proceedings of the 6th international conference on Computer vision systems},
     publisher = {Springer-Verlag},
     year = {2008},
     pages = {66--75}}
    
  2. E.J. Alles, Z.J. Geradts & C.J. Veenman
    Source Camera Identification for Low Resolution Heavily Compressed Images
    International Conference on Computational Sciences and Its Applications
    2008, pp. 557-567
    BibTeX
    @inproceedings{Alles2008,
     author = {Alles, Erwin J. and Geradts, Zeno J. and Veenman, Cor. J.},
     title = {Source Camera Identification for Low Resolution Heavily Compressed Images},
     booktitle = {International Conference on Computational Sciences and Its Applications},
     year = {2008},
     pages = {557-567}}
    
  3. I. Amerini
    Image Forensics: Source Identification and Tampering Detection
    Universit` a degli Studi di Firenze, 2008
    BibTeX
    @phdthesis{Amerini2008,
     author = {Irene Amerini},
     title = {Image Forensics: Source Identification and Tampering Detection},
     school = {Universit` a degli Studi di Firenze},
     year = {2008}}
    
  4. S. Bayram
    A Survey of Copy-Move Forgery Detection Techniques
    2008
    BibTeX
    @misc{Bayram2008,
     author = {Bayram, Sevinc},
     title = {A Survey of Copy-Move Forgery Detection Techniques},
     year = {2008}}
    
  5. S. Bayram, H.T. Sencar & N. Memon
    Classification of digital camera-models based on demosaicing artifacts
    Digital Investigation, 2008, Vol. 5(1-2), pp. 49 - 59
    BibTeX
    @article{Bayram2008a,
     author = {Sevinc Bayram and Husrev T. Sencar and Nasir Memon},
     title = {Classification of digital camera-models based on demosaicing artifacts},
     journal = {Digital Investigation},
     year = {2008},
     volume = {5},
     number = {1-2},
     pages = {49 - 59}}
    
  6. S. Bayram, H.T. Sencar & N. Memon
    Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods
    ACM International Conference on Multimedia Information Retrieval
    2008, pp. 435-442
    BibTeX
    @inproceedings{Bayram2008c,
     author = {Bayram, Sevinc and Sencar, Husrev T. and Memon, Nasir},
     title = {Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods},
     booktitle = {ACM International Conference on Multimedia Information Retrieval},
     year = {2008},
     pages = {435-442}}
    
  7. T.E. Bishop, R. Molina & J.R. Hopgood
    Blind restoration of blurred photographs via AR modelling and MCMC
    Proc. 15th IEEE International Conference on Image Processing ICIP 2008
    2008, pp. 669-672
    BibTeX
    @inproceedings{Bishop2008,
     author = {Bishop, T. E. and Molina, R. and Hopgood, J. R.},
     title = {Blind restoration of blurred photographs via AR modelling and MCMC},
     booktitle = {Proc. 15th IEEE International Conference on Image Processing ICIP 2008},
     year = {2008},
     pages = {669--672}}
    
  8. G.J. Bloy
    Blind Camera Fingerprinting and Image Clustering
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, Vol. 30(3), pp. 532-535
    BibTeX
    @article{Bloy2008,
     author = {Bloy, Greg J.},
     title = {Blind Camera Fingerprinting and Image Clustering},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {2008},
     volume = {30},
     number = {3},
     pages = {532-535}}
    
  9. A. Büllesbach
    Global, lokal, digital - Fotojournalismus heute
    Elke, G., Neverla, I. & Ammann, I. (ed.)
    Chapter Digitale Bildmanipulation und Ethik. Aktuelle Tendenzen im Fotojournalismus.
    Herbert von Halem-Verlag, 2008, pp. 108-136
    BibTeX
    @inbook{Buellesbach2008,
     author = {Büllesbach, Alfred},
     title = {Global, lokal, digital - Fotojournalismus heute},
     publisher = {Herbert von Halem-Verlag},
     year = {2008},
     pages = {108-136}}
    
  10. G. Cao, Y. Zhao & R. Ni
    Image Composition Detection Using Object-Based Color Consistency
    IEEE International Conference on Signal Processing
    2008, pp. 1186-1189
    BibTeX
    @inproceedings{Cao2008a,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong},
     title = {Image Composition Detection Using Object-Based Color Consistency},
     booktitle = {IEEE International Conference on Signal Processing},
     year = {2008},
     pages = {1186-1189}}
    
  11. H. Cao & A.C. Kot
    A generalized model for detection of demosaicing characteristics
    Proc. IEEE Int Multimedia and Expo Conf
    2008, pp. 1513-1516
    BibTeX
    @inproceedings{Cao2008,
     author = {Hong Cao and Kot, A. C.},
     title = {A generalized model for detection of demosaicing characteristics},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2008},
     pages = {1513--1516}}
    
  12. P.C.P. Carvalho, L.H.D. Figueiredo, J. Gomes & L. Velho
    Mathematical Optimization in Computer Graphics and Vision
    Morgan Kaufman Publishers, 2008
    BibTeX
    @book{Carvalho2008,
     author = {Paulo Cezar Pinto Carvalho and Luiz Henrique De Figueiredo and Jonas Gomes and Luiz Velho},
     title = {Mathematical Optimization in Computer Graphics and Vision},
     publisher = {Morgan Kaufman Publishers},
     year = {2008}}
    
  13. O. Celiktutan, B. Sankur & I. Avcibas
    Blind Identification of Source Cell-Phone Model
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 553-566
    BibTeX
    @article{Celiktutan2008,
     author = {Celiktutan, O. and Sankur, B. and Avcibas, I.},
     title = {Blind Identification of Source Cell-Phone Model},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {3},
     pages = {553--566}}
    
  14. C.-C. Chang, J.-C. Chuang & Y.-Z. Wang
    VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images
    Proc. Second Int. Symp. Intelligent Information Technology Application IITA ´08
    2008, Vol. 2, pp. 1000-1004
    BibTeX
    @inproceedings{Chang2008,
     author = {Chin-Chen Chang and Jun-Chou Chuang and Yu-Zheng Wang},
     title = {VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images},
     booktitle = {Proc. Second Int. Symp. Intelligent Information Technology Application IITA ´08},
     year = {2008},
     volume = {2},
     pages = {1000--1004}}
    
  15. M. Chen, J. Fridrich, M. Goljan & J. Lukáš
    Determining image origin and integrity using sensor noise
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 74-90
    BibTeX
    @article{Chen2008,
     author = {Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukáš},
     title = {Determining image origin and integrity using sensor noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {1},
     pages = {74--90}}
    
  16. W. Chen
    Detection of digital image and video forgeries
    New Jersey Institute of Technology, New Jersey Institute of Technology, 2008
    BibTeX
    @phdthesis{Chen2008d,
     author = {Chen, Wen},
     title = {Detection of digital image and video forgeries},
     publisher = {New Jersey Institute of Technology},
     school = {New Jersey Institute of Technology},
     year = {2008}}
    
  17. W. Chen & Y.Q. Shi
    Detection of Double MPEG Video Compression Using First Digits Statistics
    International Workshop on Digital Watermarking
    2008
    BibTeX
    @inproceedings{Chen2008c,
     author = {Chen, Wen and Shi, Yun Qing},
     title = {Detection of Double MPEG Video Compression Using First Digits Statistics},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2008}}
    
  18. W. Chen, Y.Q. Shi, G.R. Xuan & W. Su
    Computer Graphics Identification Using Genetic Algorithm
    IEEE International Conference on Pattern Recognition
    2008
    BibTeX
    @inproceedings{Chen2008b,
     author = {Chen, Wen and Shi, Yun Qing and Xuan, Guo Rong and Su, Wei},
     title = {Computer Graphics Identification Using Genetic Algorithm},
     booktitle = {IEEE International Conference on Pattern Recognition},
     year = {2008}}
    
  19. Y.-L. Chen & C.-T. Hsu
    Image tampering detection by blocking periodicity analysis in JPEG compressed images
    Proc. IEEE 10th Workshop Multimedia Signal Processing
    2008, pp. 803-808
    BibTeX
    @inproceedings{Chen2008a,
     author = {Yi-Lei Chen and Chiou-Ting Hsu},
     title = {Image tampering detection by blocking periodicity analysis in JPEG compressed images},
     booktitle = {Proc. IEEE 10th Workshop Multimedia Signal Processing},
     year = {2008},
     pages = {803--808}}
    
  20. C. Chunhua, Y.Q. Shi & S. Wei
    A Machine Learning Based Scheme for Double JPEG Compression Detection
    International Conference on Pattern Recognition
    2008, pp. 1-4
    BibTeX
    @inproceedings{Chunhua2008,
     author = {Chunhua, Chen and Shi, Yun Qing and Wei, Su},
     title = {A Machine Learning Based Scheme for Double JPEG Compression Detection},
     booktitle = {International Conference on Pattern Recognition},
     year = {2008},
     pages = {1-4}}
    
  21. W. Deng, Q. Chen, F. Yuan & Y. Yan
    Printer Identification Based on Distance Transform
    International Conference on Intelligent Networks and Intelligent Systems
    2008, pp. 565-568
    BibTeX
    @inproceedings{Deng2008,
     author = {Deng, Wei and Chen, Qinghu and Yuan, Feng and Yan, Yuchen},
     title = {Printer Identification Based on Distance Transform},
     booktitle = {International Conference on Intelligent Networks and Intelligent Systems},
     year = {2008},
     pages = {565-568}}
    
  22. A.E. Dirik, H.T. Sencar & N. Memon
    Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 539-552
    BibTeX
    @article{Dirik2008,
     author = {Dirik, A. E. and Sencar, H. T. and Memon, N. },
     title = {Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {3},
     pages = {539--552}}
    
  23. J.A. Dobrosotskaya & A.L. Bertozzi
    A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting
    IEEE Transactions on Image Processing, 2008, Vol. 17(5), pp. 657-663
    BibTeX
    @article{Dobrosotskaya2008,
     author = {Dobrosotskaya, J. A. and Bertozzi, A. L. },
     title = {A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting},
     journal = {IEEE Transactions on Image Processing},
     year = {2008},
     volume = {17},
     number = {5},
     pages = {657--663}}
    
  24. J. Dong, W. Wang, T. Tan & Y.Q. Shi
    Run-Length and Edge Statistics Based Approach for Image Splicing Detection
    International Workshop on Digital Watermarking
    2008, pp. 76-87
    BibTeX
    @inproceedings{Dong2008,
     author = {Dong, Jing and Wang, Wei and Tan, Tieniu and Shi, Yun Qing},
     title = {Run-Length and Edge Statistics Based Approach for Image Splicing Detection},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2008},
     pages = {76-87}}
    
  25. S.M. Elshoura & D.B. Megherbi
    Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery
    Proc. IEEE Conf. Technologies for Homeland Security
    2008, pp. 615-619
    BibTeX
    @inproceedings{Elshoura2008,
     author = {Elshoura, S. M. and Megherbi, D. B. },
     title = {Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery},
     booktitle = {Proc. IEEE Conf. Technologies for Homeland Security},
     year = {2008},
     pages = {615--619}}
    
  26. H. Farid
    Digital Image Ballistics from JPEG Quantization: A Followup Study
    Department of Computer Science, Dartmouth College, 2008(TR2008-638)
    BibTeX
    @techreport{Farid2008,
     author = {Farid, Hany},
     title = {Digital Image Ballistics from JPEG Quantization: A Followup Study},
     year = {2008},
     number = {TR2008-638}}
    
  27. H. Farid
    Digital Image Forensics
    Scientific American, 2008, Vol. 6(298), pp. 66-71
    BibTeX
    @article{Farid2008a,
     author = {Farid, Hany},
     title = {Digital Image Forensics},
     journal = {Scientific American},
     year = {2008},
     volume = {6},
     number = {298},
     pages = {66-71}}
    
  28. T. Filler, J. Fridrich & M. Goljan
    Using sensor pattern noise for camera model identification
    15th IEEE International Conference on Image Processing ICIP 2008
    Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on, 2008, pp. 1296-1299
    BibTeX
    @inproceedings{Filler2008b,
     author = {Filler, Tomáš and Fridrich, Jessica and Goljan, Miroslav},
     title = {Using sensor pattern noise for camera model identification},
     booktitle = {15th IEEE International Conference on Image Processing ICIP 2008},
     journal = {Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on},
     year = {2008},
     pages = {1296-1299}}
    
  29. K. Franke & S. Srihari
    Computational Forensics: An Overview
    Srihari, S. & Franke, K. (ed.)
    Computational Forensics
    Springer Berlin / Heidelberg, 2008, Vol. 5158, pp. 1-10
    BibTeX
    @incollection{Franke2008,
     author = {Franke, Katrin and Srihari, Sargur},
     title = {Computational Forensics: An Overview},
     booktitle = {Computational Forensics},
     publisher = {Springer Berlin / Heidelberg},
     year = {2008},
     volume = {5158},
     pages = {1-10}}
    
  30. A.C. Gallagher & T. Chen
    Image authentication by detecting traces of demosaicing
    Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2008
    2008, pp. 1-8
    BibTeX
    @inproceedings{Gallagher2008,
     author = {Gallagher, A. C. and Tsuhan Chen},
     title = {Image authentication by detecting traces of demosaicing},
     booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2008},
     year = {2008},
     pages = {1--8}}
    
  31. A. Garg, A. Hailu & R. Sridharan
    Image Forgery Identification Using JPEG Intrinsic Fingerprints
    Stanford Center for Image Systems Engineering, 2008
    BibTeX
    @techreport{Garg2008,
     author = {Garg, A. and Hailu, A. and Sridharan, R.},
     title = {Image Forgery Identification Using JPEG Intrinsic Fingerprints},
     year = {2008}}
    
  32. S. Gholap & P.K. Bora
    Illuminant Colour Based Image Forensics
    IEEE Region 10 Conference (TENCON 2008)
    2008
    BibTeX
    @inproceedings{Gholap2008,
     author = {Gholap, Sandeep and Bora, P. K.},
     title = {Illuminant Colour Based Image Forensics},
     booktitle = {IEEE Region 10 Conference (TENCON 2008)},
     year = {2008}}
    
  33. M. Goljan & J. Fridrich
    Camera identification from cropped and scaled images
    III, E. J. D., Wong, P. W., Dittmann, J. & Memon, N. D. (ed.)
    Proc. SPIE 6819, 68190E (2008)
    Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, SPIE, 2008, Vol. 6819(1), pp. 68190E
    BibTeX
    @conference{Goljan2008,
     author = {Miroslav Goljan and Jessica Fridrich},
     title = {Camera identification from cropped and scaled images},
     booktitle = {Proc. SPIE 6819, 68190E (2008)},
     journal = {Security, Forensics, Steganography, and Watermarking of Multimedia Contents X},
     publisher = {SPIE},
     year = {2008},
     volume = {6819},
     number = {1},
     pages = {68190E}}
    
  34. M. Goljan, J. Fridrich & J. Lukáš
    Camera Identification From Printed Images
    Delp, E. J., Wong, P. W., Dittmann, J. & Memon, N. (ed.)
    SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
    2008, Vol. 6819
    BibTeX
    @inproceedings{Goljan2008a,
     author = {Goljan, Miroslav and Fridrich, Jessica and Lukáš, Jan},
     title = {Camera Identification From Printed Images},
     booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents},
     year = {2008},
     volume = {6819}}
    
  35. J. Hays & A.A. Efros
    IM2GPS: estimating geographic information from a single image
    Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2008
    2008, pp. 1-8
    BibTeX
    @inproceedings{Hays2008,
     author = {Hays, J. and Efros, A. A.},
     title = {IM2GPS: estimating geographic information from a single image},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2008},
     year = {2008},
     pages = {1--8}}
    
  36. C.-C. Hsu, T.-Y. Hung, C.-W. Lin & C.-T. Hsu
    Video Forgery Detection Using Correlation of Noise Residue
    IEEE Workshop on Multimedia Signal Processing
    2008, pp. 170-174
    BibTeX
    @inproceedings{Hsu2008a,
     author = {Hsu, Chih-Chung and Hung, Tzu-Yi and Lin, Chia-Wen and Hsu, Chiou-Ting},
     title = {Video Forgery Detection Using Correlation of Noise Residue},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2008},
     pages = {170-174}}
    
  37. Y.-F. Hsu & S.-F. Chang
    Statistical fusion of multiple cues for image tampering detection
    Proc. 42nd Asilomar Conf. Signals, Systems and Computers
    2008, pp. 1386-1390
    BibTeX
    @inproceedings{Hsu2008,
     author = {Yu-Feng Hsu and Shih-Fu Chang},
     title = {Statistical fusion of multiple cues for image tampering detection},
     booktitle = {Proc. 42nd Asilomar Conf. Signals, Systems and Computers},
     year = {2008},
     pages = {1386--1390}}
    
  38. H. Huang, W. Guo & Y. Zhang
    Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm
    Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application PACIIA ´08
    2008, Vol. 2, pp. 272-276
    BibTeX
    @inproceedings{Huang2008,
     author = {Huang, Hailing and Guo, Weiqiang and Zhang, Yu},
     title = {Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm},
     booktitle = {Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application PACIIA ´08},
     year = {2008},
     volume = {2},
     pages = {272--276}}
    
  39. Y. Huang
    Demosaicking Recognition with Applications in Digital Photo Authentication based on a Quadratic Pixel Correlation Model
    Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
    2008
    BibTeX
    @inproceedings{Huang2008a,
     author = {Yizhen Huang},
     title = {Demosaicking Recognition with Applications in Digital Photo Authentication based on a Quadratic Pixel Correlation Model},
     booktitle = {Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition},
     year = {2008}}
    
  40. IPTC
    IPTC Standard: Information Interchange Model (IIM) - IIM Schema for XMP Specification Version 1.0
    IPTC, 2008
    BibTeX
    @standard{IPTC2008,
     author = {IPTC},
     title = {IPTC Standard: Information Interchange Model (IIM) - IIM Schema for XMP Specification Version 1.0},
     year = {2008}}
    
  41. X. Kang & S. Wei
    Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics
    Proc. International Conference on Computer Science and Software Engineering
    2008, Vol. 3, pp. 926-930
    BibTeX
    @inproceedings{Kang2008,
     author = {Kang, XiaoBing and Wei, ShengMin},
     title = {Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics},
     booktitle = {Proc. International Conference on Computer Science and Software Engineering},
     year = {2008},
     volume = {3},
     pages = {926--930}}
    
  42. E. Kee & H. Farid
    Printer Profiling for Forensics and Ballistics
    ACM Multimedia and Security Workshop
    2008, pp. 3-10
    BibTeX
    @inproceedings{Kee2008,
     author = {Kee, Eric and Farid, Hany},
     title = {Printer Profiling for Forensics and Ballistics},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2008},
     pages = {3-10}}
    
  43. N. Khanna, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Forensic techniques for classifying scanner, computer generated and digital camera images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
    2008, pp. 1653-1656
    BibTeX
    @inproceedings{Khanna2008,
     author = {Khanna, N. and Chiu, G. T.-C. and Allebach, J. P. and Delp, E. J. },
     title = {Forensic techniques for classifying scanner, computer generated and digital camera images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008},
     year = {2008},
     pages = {1653--1656}}
    
  44. N. Khanna, G.-T.-C. Chiu, J.-P. Allebach & E.-J. Delp
    Scanner identification with extension to forgery detection
    Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
    2008, Vol. 6819
    BibTeX
    @inproceedings{Khanna2008a,
     author = {Khanna, N. and Chiu, G.-T.-C. and Allebach, J.-P. and Delp, E.-J.},
     title = {Scanner identification with extension to forgery detection},
     booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series},
     year = {2008},
     volume = {6819}}
    
  45. N. Khanna, A.K. Mikkilineni, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Survey of Scanner and Printer Forensics at Purdue University
    International Workshop on Computational Forensics
    2008, pp. 22-34
    BibTeX
    @inproceedings{Khanna2008b,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Survey of Scanner and Printer Forensics at Purdue University},
     booktitle = {International Workshop on Computational Forensics},
     year = {2008},
     pages = {22-34}}
    
  46. B.-K. Kim & R.-H. Park
    Automatic detection and correction of purple fringing using the gradient information and desaturation
    Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)
    2008
    BibTeX
    @inproceedings{Kim2008,
     author = {Baek-Kyu Kim and Rae-Hong Park},
     title = {Automatic detection and correction of purple fringing using the gradient information and desaturation},
     booktitle = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)},
     year = {2008}}
    
  47. M. Kirchner
    On the Detectability of Local Resampling in Digital Images
    Delp, E. J., Wong, P. W., Dittmann, J. & Memon, N. (ed.)
    SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
    2008, Vol. 6819
    BibTeX
    @inproceedings{Kirchner2008a,
     author = {Kirchner, Matthias},
     title = {On the Detectability of Local Resampling in Digital Images},
     booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents},
     year = {2008},
     volume = {6819}}
    
  48. M. Kirchner
    Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue
    ACM Multimedia and Security Workshop
    2008, pp. 11-20
    BibTeX
    @inproceedings{Kirchner2008c,
     author = {Kirchner, Matthias},
     title = {Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2008},
     pages = {11-20}}
    
  49. M. Kirchner & R. Bohme
    Hiding Traces of Resampling in Digital Images
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(4), pp. 582-592
    BibTeX
    @article{Kirchner2008,
     author = {Kirchner, M. and Bohme, R.},
     title = {Hiding Traces of Resampling in Digital Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {4},
     pages = {582--592}}
    
  50. J.D. Kornblum
    Using JPEG quantization tables to identify imagery processed by software
    Digital Investigation, 2008, Vol. 5, pp. S21-S25
    BibTeX
    @article{Kornblum2008,
     author = {Jesse D. Kornblum},
     title = {Using JPEG quantization tables to identify imagery processed by software},
     journal = {Digital Investigation},
     year = {2008},
     volume = {5},
     pages = {S21-S25}}
    
  51. A. Koschan & M. Abidi
    Digital color image processing
    Wiley-Interscience, 2008
    BibTeX
    @book{Koschan2008,
     author = {Koschan, Andreas and Abidi, Mongi},
     title = {Digital color image processing},
     publisher = {Wiley-Interscience},
     year = {2008}}
    
  52. J.-F. Lalonde, S. Narasimhan & A. Efros
    What Does the Sky Tell Us about the Camera?
    Forsyth, D., Torr, P. & Zisserman, A. (ed.)
    Computer Vision -- ECCV 2008
    Springer Berlin / Heidelberg, 2008, Vol. 5305, pp. 354-367
    BibTeX
    @incollection{Lalonde2008,
     author = {Lalonde, Jean-François and Narasimhan, Srinivasa and Efros, Alexei},
     title = {What Does the Sky Tell Us about the Camera?},
     booktitle = {Computer Vision -- ECCV 2008},
     publisher = {Springer Berlin / Heidelberg},
     year = {2008},
     volume = {5305},
     pages = {354-367}}
    
  53. B. Li, Y.Q. Shi & J. Huang
    Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features
    IEEE Workshop on Multimedia Signal Processing
    2008, pp. 730-735
    BibTeX
    @inproceedings{Li2008e,
     author = {Li, Bin and Shi, Yun Qing and Huang, Jiwu},
     title = {Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2008},
     pages = {730-735}}
    
  54. W. Li, N. Yu & Y. Yuan
    Doctored JPEG image detection
    Proc. IEEE Int Multimedia and Expo Conf
    2008, pp. 253-256
    BibTeX
    @inproceedings{Li2008b,
     author = {Weihai Li and Nenghai Yu and Yuan Yuan},
     title = {Doctored JPEG image detection},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2008},
     pages = {253--256}}
    
  55. W. Li, N. Yu & Y. Yuan
    Doctored JPEG Image Detection
    IEEE International Conference on Multimedia and Expo
    2008, pp. 253-256
    BibTeX
    @inproceedings{Li2008d,
     author = {Li, Weihai and Yu, Nenghai and Yuan, Yuan},
     title = {Doctored JPEG Image Detection},
     booktitle = {IEEE International Conference on Multimedia and Expo},
     year = {2008},
     pages = {253-256}}
    
  56. W. Li, Y. Yuan & N. Yu
    Detecting copy-paste Forgery of JPEG Image via Block Artifact Grid Extraction
    Proceedings of the 2008 International Workshop on Local and Non-Local Approximation in Image Processing
    2008
    BibTeX
    @inproceedings{Li2008,
     author = {Weihai Li and Yuan Yuan and Nenghai Yu},
     title = {Detecting copy-paste Forgery of JPEG Image via Block Artifact Grid Extraction},
     booktitle = {Proceedings of the 2008 International Workshop on Local and Non-Local Approximation in Image Processing},
     year = {2008}}
    
  57. X. Li, B. Gunturk & L. Zhang
    Image demosaicing: A systematic survey
    Proc. of SPIE
    2008, Vol. 6822, pp. 68221J-68221J
    BibTeX
    @inproceedings{Li2008c,
     author = {Li, X. and Gunturk, B. and Zhang, L.},
     title = {Image demosaicing: A systematic survey},
     booktitle = {Proc. of SPIE},
     year = {2008},
     volume = {6822},
     pages = {68221J--68221J}}
    
  58. Z. Li, A.Y.C. Nee, S.K. Ong & W. Gong
    Tampered Image Detection Using Image Matching
    Proc. Fifth Int. Conf. Computer Graphics, Imaging and Visualisation CGIV ´08
    2008, pp. 174-179
    BibTeX
    @inproceedings{Li2008a,
     author = {Zhenghao Li and Nee, A. Y. C. and Ong, S. K. and Weiguo Gong},
     title = {Tampered Image Detection Using Image Matching},
     booktitle = {Proc. Fifth Int. Conf. Computer Graphics, Imaging and Visualisation CGIV ´08},
     year = {2008},
     pages = {174--179}}
    
  59. Y.-C. Lin, D. Varodayan, T. Fink, E. Betters & B. Girod
    Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization
    Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
    2008, pp. 2204-2207
    BibTeX
    @inproceedings{Lin2008,
     author = {Yao-Chung Lin and Varodayan, D. and Fink, T. and Betters, E. and Girod, B. },
     title = {Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization},
     booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008},
     year = {2008},
     pages = {2204--2207}}
    
  60. C. Liu, R. Szeliski, S.B. Kang, C.L. Zitnick & W.T. Freeman
    Automatic Estimation and Removal of Noise from a Single Image
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, Vol. 30(2), pp. 299-314
    BibTeX
    @article{Liu2008,
     author = {Ce Liu and Szeliski, R. and Sing Bing Kang and Zitnick, C. L. and Freeman, W. T.},
     title = {Automatic Estimation and Removal of Noise from a Single Image},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {2008},
     volume = {30},
     number = {2},
     pages = {299--314}}
    
  61. W. Lu, W. Sun, J. Huang & H.-T. Lu
    Digital Image Forensics Using Statistical Features and Neural Network Classifier
    International Conference on Machine Learning and Cybernetics
    2008, pp. 2831-2834
    BibTeX
    @inproceedings{Lu2008,
     author = {Lu, Wei and Sun, Wei and Huang, Jiwu and Lu, Hong-Tao},
     title = {Digital Image Forensics Using Statistical Features and Neural Network Classifier},
     booktitle = {International Conference on Machine Learning and Cybernetics},
     year = {2008},
     pages = {2831-2834}}
    
  62. W. Luo, M. Wu & J. Huang
    MPEG Recompression Detection Based on Block Artifacts
    SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
    2008
    BibTeX
    @inproceedings{Luo2008,
     author = {Luo, Weiqi and Wu, Min and Huang, Jiwu},
     title = {MPEG Recompression Detection Based on Block Artifacts},
     booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents},
     year = {2008}}
    
  63. B. Mahdian & S. Saic
    Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics
    Proc. International Conference on Computational Sciences and Its Applications ICCSA ´08
    2008, pp. 546-556
    BibTeX
    @inproceedings{Mahdian2008,
     author = {Mahdian, B. and Saic, S.},
     title = {Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics},
     booktitle = {Proc. International Conference on Computational Sciences and Its Applications ICCSA ´08},
     year = {2008},
     pages = {546--556}}
    
  64. B. Mahdian & S. Saic
    Blind methods for detecting image fakery
    Proc. 42nd Annual IEEE International Carnahan Conference on Security Technology ICCST 2008
    2008, pp. 280-286
    BibTeX
    @inproceedings{Mahdian2008a,
     author = {Mahdian, B. and Saic, S.},
     title = {Blind methods for detecting image fakery},
     booktitle = {Proc. 42nd Annual IEEE International Carnahan Conference on Security Technology ICCST 2008},
     year = {2008},
     pages = {280--286}}
    
  65. B. Mahdian & S. Saic
    Blind Authentication Using Periodic Properties of Interpolation
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 529-538
    BibTeX
    @article{Mahdian2008d,
     author = {Mahdian, B. and Saic, S.},
     title = {Blind Authentication Using Periodic Properties of Interpolation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {3},
     pages = {529--538}}
    
  66. J.-B. Maillard, D. Levesque & F. Deschenes
    Detection of digital processing of images through a realistic model of CCD noise
    Proc. 19th International Conference on Pattern Recognition ICPR 2008
    2008, pp. 1-4
    BibTeX
    @inproceedings{Maillard2008,
     author = {Maillard, J.-B. and Levesque, D. and Deschenes, F.},
     title = {Detection of digital processing of images through a realistic model of CCD noise},
     booktitle = {Proc. 19th International Conference on Pattern Recognition ICPR 2008},
     year = {2008},
     pages = {1--4}}
    
  67. S. McCloskey
    Confidence Weighting for Sensor Fingerprinting
    Computer Vision and Pattern Recognition
    2008, pp. 1-6
    BibTeX
    @inproceedings{McCloskey2008,
     author = {McCloskey, Scott},
     title = {Confidence Weighting for Sensor Fingerprinting},
     booktitle = {Computer Vision and Pattern Recognition},
     year = {2008},
     pages = {1-6}}
    
  68. C. McKay, A. Swaminathan, H. Gou & M. Wu
    Image acquisition forensics: Forensic analysis to identify imaging source
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
    2008, pp. 1657-1660
    BibTeX
    @inproceedings{McKay2008,
     author = {McKay, C. and Swaminathan, A. and Hongmei Gou and Min Wu},
     title = {Image acquisition forensics: Forensic analysis to identify imaging source},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008},
     year = {2008},
     pages = {1657--1660}}
    
  69. F. Meng, X. Kong & X. You
    A New Feature-Based Method for Source Camera Identification
    Ray, I. & Shenoi, S. (ed.)
    Advances in Digital Forensics IV
    2008, Vol. 285, pp. 207-218
    BibTeX
    @inproceedings{Meng2008,
     author = {Meng, Fanjie and Kong, Xiangwei and You, Xingang},
     title = {A New Feature-Based Method for Source Camera Identification},
     booktitle = {Advances in Digital Forensics IV},
     year = {2008},
     volume = {285},
     pages = {207-218}}
    
  70. M.S. Nixon & A.S. Aguado
    Feature Extraction and Image Processing
    Academic Press, 2008
    BibTeX
    @book{Nixon2008,
     author = {Mark S. Nixon and Alberto S. Aguado},
     title = {Feature Extraction and Image Processing},
     publisher = {Academic Press},
     year = {2008},
     edition = {2nd}}
    
  71. M.S. Olivier
    Using Sensor Dirt for Toolmark Analysis of Digital Photographs
    Ray, I. & Shenoi, S. (ed.)
    Advances in Digital Forensics IV
    2008, Vol. 285, pp. 193-206
    BibTeX
    @inproceedings{Olivier2008a,
     author = {Olivier, Martin S.},
     title = {Using Sensor Dirt for Toolmark Analysis of Digital Photographs},
     booktitle = {Advances in Digital Forensics IV},
     year = {2008},
     volume = {285},
     pages = {193-206}}
    
  72. M.S. Olivier
    On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location
    South African Computer Journal, 2008, Vol. 41, pp. 21-28
    BibTeX
    @article{Olivier2008,
     author = {Olivier, Martin S.},
     title = {On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location},
     journal = {South African Computer Journal},
     year = {2008},
     volume = {41},
     pages = {21-28}}
    
  73. A. Petkov & S. Cottier
    Image Quality Estimation for JPEG-Compressed Images without the Original Image
    Stanford Center for Image Systems Engineering, 2008
    BibTeX
    @techreport{Petkov2008,
     author = {Petkov, Atanas and Cottier, Scott},
     title = {Image Quality Estimation for JPEG-Compressed Images without the Original Image},
     year = {2008}}
    
  74. T. Pevny & J. Fridrich
    Detection of Double-Compression in JPEG Images for Applications in Steganography
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(2), pp. 247-258
    BibTeX
    @article{Pevny2008,
     author = {Pevny, T. and Fridrich, J. },
     title = {Detection of Double-Compression in JPEG Images for Applications in Steganography},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {2},
     pages = {247--258}}
    
  75. M.-C. Poilpré, P. Perrot & H. Talbot
    Image tampering detection using Bayer interpolation and JPEG compression
    e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
    ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-5
    BibTeX
    @inproceedings{Poilpre2008,
     author = {Poilpré, Marie-Charlotte and Perrot, Patrick and Talbot, Hugues},
     title = {Image tampering detection using Bayer interpolation and JPEG compression},
     booktitle = {e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop},
     publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)},
     year = {2008},
     pages = {1--5}}
    
  76. Z. Qu, W. Luo & J. Huang
    A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication
    IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
    2008, pp. 1661-1664
    BibTeX
    @inproceedings{Qu2008,
     author = {Qu, Zhenhua and Luo, Weiqi and Huang, Jiwu},
     title = {A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
     year = {2008},
     pages = {1661-1664}}
    
  77. REUTERS
    Reuters Handbook of Journalism
    2008
    BibTeX
    @electronic{REUTERS2008,
     author = {REUTERS},
     title = {Reuters Handbook of Journalism},
     year = {2008}}
    
  78. C. Rhemann, C. Rother & M. Gelautz
    Improving Color Modeling for Alpha Matting
    Proceedings of the British Machine Vision Conference 2008, CiteSeerX - Scientific Literature Digital Library and Search Engine [http://citeseerx.ist.psu.edu/oai2] (United States), 2008, Vol. -, pp. 1155 - 1164
    BibTeX
    @article{Rhemann2009,
     author = {Christoph Rhemann and Carsten Rother and Margrit Gelautz},
     title = {Improving Color Modeling for Alpha Matting},
     journal = {Proceedings of the British Machine Vision Conference 2008},
     year = {2008},
     volume = {-},
     pages = {1155 - 1164}}
    
  79. A. Saxena, S. Chung & A. Ng
    3-D Depth Reconstruction from a Single Still Image
    International Journal of Computer Vision, Springer Netherlands, 2008, Vol. 76, pp. 53-69
    BibTeX
    @article{Saxena2008,
     author = {Saxena, Ashutosh and Chung, Sung and Ng, Andrew},
     title = {3-D Depth Reconstruction from a Single Still Image},
     journal = {International Journal of Computer Vision},
     publisher = {Springer Netherlands},
     year = {2008},
     volume = {76},
     pages = {53-69}}
    
  80. H.T. Sencar & N. Memon
    Algorithms, Architectures and Information Systems Security
    Bagchi, A., Bhattacharya, B. B., Sur-kolay, S. & Nandy, S. C. (ed.)
    Chapter Overview of State-of-the-art in Digital Image Forensics
    World Scientific Publishing Co., Inc., 2008, pp. 325-348
    BibTeX
    @inbook{Sencar2008,
     author = {Sencar, Husrev T. and Memon, Nasir},
     title = {Algorithms, Architectures and Information Systems Security},
     publisher = {World Scientific Publishing Co., Inc.},
     year = {2008},
     pages = {325-348}}
    
  81. Y.Q. Shi
    First Digit Law and its Application to Digital Forensics
    International Workshop on Digital Watermarking
    2008
    BibTeX
    @inproceedings{Shi2008,
     author = {Shi, Yun Qing},
     title = {First Digit Law and its Application to Digital Forensics},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2008}}
    
  82. Y.Q. Shi, C. Chen, G. Xuan & W. Su
    Steganalysis Versus Splicing Detection
    IWDW ´07: Proceedings of the 6th International Workshop on Digital Watermarking
    Springer-Verlag, 2008, pp. 158-172
    BibTeX
    @inproceedings{Shi2008a,
     author = {Shi, Yun Q. and Chen, Chunhua and Xuan, Guorong and Su, Wei},
     title = {Steganalysis Versus Splicing Detection},
     booktitle = {IWDW ´07: Proceedings of the 6th International Workshop on Digital Watermarking},
     publisher = {Springer-Verlag},
     year = {2008},
     pages = {158--172}}
    
  83. M.J. Sorell
    Conditions for effective detection and identification of primary quantization of re-quantized JPEG images
    e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
    ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-6
    BibTeX
    @inproceedings{Sorell2008,
     author = {Sorell, Matthew James},
     title = {Conditions for effective detection and identification of primary quantization of re-quantized JPEG images},
     booktitle = {e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop},
     publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)},
     year = {2008},
     pages = {1--6}}
    
  84. G.C. Sroubek & J. Flusser
    Simultaneous super-resolution and blind deconvolution
    Journal of Physics:Conference Series
    2008
    BibTeX
    @conference{Sroubek2008,
     author = {Sroubek, G Cristobal and J Flusser},
     title = {Simultaneous super-resolution and blind deconvolution},
     booktitle = {Journal of Physics:Conference Series},
     year = {2008}}
    
  85. M. Stamm & K.J.R. Liu
    Blind forensics of contrast enhancement in digital images
    Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
    2008, pp. 3112-3115
    BibTeX
    @inproceedings{Stamm2008a,
     author = {Stamm, M. and Liu, K. J. R.},
     title = {Blind forensics of contrast enhancement in digital images},
     booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008},
     year = {2008},
     pages = {3112--3115}}
    
  86. A. Suwendi & J.P. Allebach
    Nearest-Neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image
    Journal of Electronic Imaging, 2008, Vol. 17(2), pp. 94-101
    BibTeX
    @article{Suwendi2008,
     author = {Suwendi, Ariawan and Allebach, Jan P.},
     title = {Nearest-Neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image},
     journal = {Journal of Electronic Imaging},
     year = {2008},
     volume = {17},
     number = {2},
     pages = {94-101}}
    
  87. A. Swaminathan, M. Wu & K.J.R. Liu
    Digital Image Forensics via Intrinsic Fingerprints
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 101-117
    BibTeX
    @article{Swaminathan2008,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {Digital Image Forensics via Intrinsic Fingerprints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {1},
     pages = {101--117}}
    
  88. A. Swaminathan, M. Wu & K.J.R. Liu
    A pattern classification framework for theoretical analysis of component forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
    2008, pp. 1665-1668
    BibTeX
    @inproceedings{Swaminathan2008b,
     author = {Swaminathan, Ashwin. and Min Wu and Liu, K. J. R.},
     title = {A pattern classification framework for theoretical analysis of component forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008},
     year = {2008},
     pages = {1665--1668}}
    
  89. M. Tagliasacchi, G. Valenzise & S. Tubaro
    Localization of sparse image tampering via random projections
    Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
    2008, pp. 2092-2095
    BibTeX
    @inproceedings{Tagliasacchi2008,
     author = {Tagliasacchi, Marco and Valenzise, Giuseppe and Tubaro, Stefano},
     title = {Localization of sparse image tampering via random projections},
     booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008},
     year = {2008},
     pages = {2092--2095}}
    
  90. S.-C. Tai & S.-M. Yang
    A fast method for image noise estimation using Laplacian operator and adaptive edge detection
    Proc. 3rd International Symposium on Communications, Control and Signal Processing ISCCSP 2008
    2008, pp. 1077-1081
    BibTeX
    @inproceedings{Tai2008,
     author = {Shen-Chuan Tai and Shih-Ming Yang},
     title = {A fast method for image noise estimation using Laplacian operator and adaptive edge detection},
     booktitle = {Proc. 3rd International Symposium on Communications, Control and Signal Processing ISCCSP 2008},
     year = {2008},
     pages = {1077--1081}}
    
  91. M.-J. Tsai & C.-S. Wang
    Adaptive feature selection for digital camera source identification
    Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008
    2008, pp. 412-415
    BibTeX
    @inproceedings{Tsai2008,
     author = {Min-Jen Tsai and Cheng-Sheng Wang},
     title = {Adaptive feature selection for digital camera source identification},
     booktitle = {Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008},
     year = {2008},
     pages = {412--415}}
    
  92. T. Tuytelaars & K. Mikolajczyk
    Local invariant feature detectors: a survey
    Found. Trends. Comput. Graph. Vis., Now Publishers Inc., 2008, Vol. 3(3), pp. 177-280
    BibTeX
    @article{Tuytelaars2008,
     author = {Tuytelaars, Tinne and Mikolajczyk, Krystian},
     title = {Local invariant feature detectors: a survey},
     journal = {Found. Trends. Comput. Graph. Vis.},
     publisher = {Now Publishers Inc.},
     year = {2008},
     volume = {3},
     number = {3},
     pages = {177--280}}
    
  93. Velho, Luiz, A.C. Frery & J. Gomes
    Image Processing for Computer Graphics and Vision
    Gries, D. & Schneider, F. B. (ed.)
    Springer, 2008
    BibTeX
    @book{Velho2008,
     author = {Velho, Luiz, and Frery, Alejandro C. and Gomes, Jonas},
     title = {Image Processing for Computer Graphics and Vision},
     publisher = {Springer},
     year = {2008}}
    
  94. W. Wang & H. Farid
    Detecting Re-Projected Video
    International Workshop on Information Hiding
    2008, pp. 72-86
    BibTeX
    @inproceedings{Wang2008b,
     author = {Wang, Weihong and Farid, Hany},
     title = {Detecting Re-Projected Video},
     booktitle = {International Workshop on Information Hiding},
     year = {2008},
     pages = {72-86}}
    
  95. X. Wang, B. Xuan & S. long Peng
    Digital Image Forgery Detection Based on the Consistency of Defocus Blur
    Proc. IIHMSP ´08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    2008, pp. 192-195
    BibTeX
    @inproceedings{Wang2008,
     author = {Wang, Xin and Xuan, Bo and long Peng, Si},
     title = {Digital Image Forgery Detection Based on the Consistency of Defocus Blur},
     booktitle = {Proc. IIHMSP ´08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
     year = {2008},
     pages = {192--195}}
    
  96. W. Weimin, W. Shuozhong & T. Zhenjun
    Estimation of rescaling factor and detection of image splicing
    Proc. 11th IEEE Int. Conf. Communication Technology ICCT 2008
    2008, pp. 676-679
    BibTeX
    @inproceedings{Weimin2008,
     author = {Wei Weimin and Wang Shuozhong and Tang Zhenjun},
     title = {Estimation of rescaling factor and detection of image splicing},
     booktitle = {Proc. 11th IEEE Int. Conf. Communication Technology ICCT 2008},
     year = {2008},
     pages = {676--679}}
    
  97. P. Wendykier & J.G. Nagy
    Image Processing on Modern CPUs and GPUs
    Emory University, 2008(TR-2008-023)
    BibTeX
    @techreport{Wendykier2008,
     author = {Wendykier, Piotr and Nagy, James G.},
     title = {Image Processing on Modern CPUs and GPUs},
     year = {2008},
     number = {TR-2008-023}}
    
  98. Y. Wo, G.-Q. Han & B. Zhang
    Geometrically robust image content authentication using Zernike moments
    Proc. Int Machine Learning and Cybernetics Conf
    2008, Vol. 5, pp. 2874-2879
    BibTeX
    @inproceedings{Wo2008,
     author = {Yan Wo and Guo-Qiang Han and Bo Zhang},
     title = {Geometrically robust image content authentication using Zernike moments},
     booktitle = {Proc. Int Machine Learning and Cybernetics Conf},
     year = {2008},
     volume = {5},
     pages = {2874--2879}}
    
  99. Q. Wu, S.-J. Sun, W. Zhu, G.-H. Li & D. Tu
    Detection of Digital Doctoring in Exemplar-Based Inpainted Images
    International Conference on Machine Learning and Cybernetics
    2008, pp. 1222-1226
    BibTeX
    @inproceedings{Wu2008,
     author = {Wu, Qiong and Sun, Shao-Jie and Zhu, Wei and Li, Guo-Hui and Tu, Dan},
     title = {Detection of Digital Doctoring in Exemplar-Based Inpainted Images},
     booktitle = {International Conference on Machine Learning and Cybernetics},
     year = {2008},
     pages = {1222-1226}}
    
  100. R. Yang, Z. Qu & J. Huang
    Detecting Digital Audio Forgeries by Checking Frame Offsets
    ACM Proceedings of the Multimedia and Security Workshop
    2008, pp. 21-26
    BibTeX
    @inproceedings{Yang2008,
     author = {Yang, Rui and Qu, Zhenhua and Huang, Jiwu},
     title = {Detecting Digital Audio Forgeries by Checking Frame Offsets},
     booktitle = {ACM Proceedings of the Multimedia and Security Workshop},
     year = {2008},
     pages = {21-26}}
    
  101. C. Ying & W. Yuping
    Exposing Digital Forgeries by Detecting Traces of Smoothing
    Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008
    2008, pp. 1440-1445
    BibTeX
    @inproceedings{Ying2008,
     author = {Chen Ying and Wang Yuping},
     title = {Exposing Digital Forgeries by Detecting Traces of Smoothing},
     booktitle = {Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008},
     year = {2008},
     pages = {1440--1445}}
    
  102. H. Yu, T.-T. Ng & Q. Sun
    Recaptured Photo Detection using Specularity Distribution
    IEEE International Conference on Image Processing
    2008
    BibTeX
    @inproceedings{Yu2008,
     author = {Yu, Hang and Ng, Tian-Tsong and Sun, Qibin},
     title = {Recaptured Photo Detection using Specularity Distribution},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2008}}
    
  103. Y.-I. Yun, J.-B. Lee, D. un Jung, D.-H. Har & J.-S. Choi
    Detection of digital forgeries using an image interpolation from digital images
    Proc. IEEE Int. Symp. Consumer Electronics ISCE 2008
    2008, pp. 1-4
    BibTeX
    @inproceedings{Yun2008,
     author = {Yong-In Yun and Jung-Beom Lee and Da-un Jung and Dong-Hwan Har and Jong-Soo Choi},
     title = {Detection of digital forgeries using an image interpolation from digital images},
     booktitle = {Proc. IEEE Int. Symp. Consumer Electronics ISCE 2008},
     year = {2008},
     pages = {1--4}}
    
  104. C. Zhang & H. Zhang
    Digital Camera Identification Based on Canonical Correlation Analysis
    IEEE Workshop on Multimedia Signal Processing
    2008, pp. 769-773
    BibTeX
    @inproceedings{Zhang2008d,
     author = {Zhang, Chi and Zhang, Hongbin},
     title = {Digital Camera Identification Based on Canonical Correlation Analysis},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2008},
     pages = {769-773}}
    
  105. J. Zhang, Z. Feng & Y. Su
    A new approach for detecting Copy-Move forgery in digital images
    Proc. 11th IEEE Singapore International Conference on Communication Systems ICCS 2008
    2008, pp. 362-366
    BibTeX
    @inproceedings{Zhang2008,
     author = {Zhang, Jing and Feng, Zhanlei and Su, Yuting},
     title = {A new approach for detecting Copy-Move forgery in digital images},
     booktitle = {Proc. 11th IEEE Singapore International Conference on Communication Systems ICCS 2008},
     year = {2008},
     pages = {362--366}}
    
  106. Z. Zhang, Y. Bian & X. Ping
    Image Blind Forensics Using Artificial Neural Network
    Proc. Int Computer Science and Software Engineering Conf
    2008, Vol. 4, pp. 847-850
    BibTeX
    @inproceedings{Zhang2008g,
     author = {Zhen Zhang and Yukun Bian and Xijian Ping},
     title = {Image Blind Forensics Using Artificial Neural Network},
     booktitle = {Proc. Int Computer Science and Software Engineering Conf},
     year = {2008},
     volume = {4},
     pages = {847--850}}
    
  107. Z. Zhang, J. Kang & Y. Ren
    An Effective Algorithm of Image Splicing Detection
    Proc. International Conference on Computer Science and Software Engineering
    2008, Vol. 1, pp. 1035-1039
    BibTeX
    @inproceedings{Zhang2008a,
     author = {Zhang, Zhen and Kang, Jiquan and Ren, Yuan},
     title = {An Effective Algorithm of Image Splicing Detection},
     booktitle = {Proc. International Conference on Computer Science and Software Engineering},
     year = {2008},
     volume = {1},
     pages = {1035--1039}}
    
  108. Z. Zhang, Y. Ren, X.-J. Ping, Z.-Y. He & S.-Z. Zhang
    A survey on passive-blind image forgery by doctor method detection
    Proc. Int Machine Learning and Cybernetics Conf
    2008, Vol. 6, pp. 3463-3467
    BibTeX
    @inproceedings{Zhang2008c,
     author = {Zhen Zhang and Yuan Ren and Xi-Jian Ping and Zhi-Yong He and Shan-Zhong Zhang},
     title = {A survey on passive-blind image forgery by doctor method detection},
     booktitle = {Proc. Int Machine Learning and Cybernetics Conf},
     year = {2008},
     volume = {6},
     pages = {3463--3467}}
    
  109. Z. Zhang, Y. Zhou, J. Kang & Y. Ren
    Study of Image Splicing Detection
    International Conference on Intelligent Computing
    2008, pp. 1103-1110
    BibTeX
    @inproceedings{Zhang2008b,
     author = {Zhang, Zhen and Zhou, Ying and Kang, Jiquan and Ren, Yuan},
     title = {Study of Image Splicing Detection},
     booktitle = {International Conference on Intelligent Computing},
     year = {2008},
     pages = {1103-1110}}
    


2007

  1. C. Albrecht
    Mit Bildern lügen
    Metten, T. (ed.)
    Chapter Wörter lügen manchmal, Bilder immer. Wissenschaft nach der Wende zum Bild.
    Herbert von Halem Verlag, 2007
    BibTeX
    @inbook{Albrecht2007,
     author = {Albrecht, Clemens},
     title = {Mit Bildern lügen},
     publisher = {Herbert von Halem Verlag},
     year = {2007}}
    
  2. M.K. Bashar, K. Noda, N. Ohnishi, H. Kudo, T. Matsumoto & Y. Takeuchi
    Wavelet-Based Multiresolution Features for Detecting Duplications in Images
    Machine Vision Application
    2007, pp. 264-267
    BibTeX
    @inproceedings{Bashar2007,
     author = {Bashar, Md. Khayrul and Noda, Keiji and Ohnishi, Noboru and Kudo, Hiroaki and Matsumoto, Tetsuya and Takeuchi, Yoshinori},
     title = {Wavelet-Based Multiresolution Features for Detecting Duplications in Images},
     booktitle = {Machine Vision Application},
     year = {2007},
     pages = {264-267}}
    
  3. R. Basri, D. Jacobs & I. Kemelmacher
    Photometric Stereo with General, Unknown Lighting
    International Journal of Computer Vision, Springer Netherlands, 2007, Vol. 72, pp. 239-257
    BibTeX
    @article{Basri2007,
     author = {Basri, Ronen and Jacobs, David and Kemelmacher, Ira},
     title = {Photometric Stereo with General, Unknown Lighting},
     journal = {International Journal of Computer Vision},
     publisher = {Springer Netherlands},
     year = {2007},
     volume = {72},
     pages = {239-257}}
    
  4. J. Bijhold, A. Ruifrok, M. Jessen, Z.J. Geradts, S. Ehrhardt & I. Alberink
    Forensic Audio and Visual Evidence
    International Forensic Science Symposium
    2007, pp. 372-413
    BibTeX
    @inproceedings{Bijhold2007,
     author = {Bijhold, Jurrien and Ruifrok, Arnout and Jessen, Michael and Geradts, Zeno J. and Ehrhardt, Sabine and Alberink, Ivo},
     title = {Forensic Audio and Visual Evidence},
     booktitle = {International Forensic Science Symposium},
     year = {2007},
     pages = {372-413}}
    
  5. O. Celiktutan, I. Avcibas & B. Sankur
    Blind Identification of Cellular Phone Cameras
    Delp, E. J. & Wong, P. W. (ed.)
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2007, Vol. 6505
    BibTeX
    @inproceedings{Celiktutan2007a,
     author = {Celiktutan, Oya and Avcibas, Ismail and Sankur, Bulent},
     title = {Blind Identification of Cellular Phone Cameras},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2007},
     volume = {6505}}
    
  6. O. Celiktutan, B. Sankur & I. Avcibas
    Digital Camera Identification
    Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007
    2007, pp. 1-4
    BibTeX
    @inproceedings{Celiktutan2007,
     author = {Celiktutan, O. and Sankur, B. and Avcibas, I.},
     title = {Digital Camera Identification},
     booktitle = {Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007},
     year = {2007},
     pages = {1--4}}
    
  7. S.-F. Chang
    Blind Passive Media Forensics: Motivation and Opportunity
    Multimedia Content Analysis and Mining
    2007, pp. 57-59
    BibTeX
    @inproceedings{Chang2007,
     author = {Chang, Shih-Fu},
     title = {Blind Passive Media Forensics: Motivation and Opportunity},
     booktitle = {Multimedia Content Analysis and Mining},
     year = {2007},
     pages = {57-59}}
    
  8. M. Chen, J. Fridrich, M. Goljan & J. Lukaš
    Source digital camcorder identification using sensor photo response non-uniformity
    III, E. J. D. & Wong, P. W. (ed.)
    Proceeding of the SPIE, 2007
    Security, Steganography, and Watermarking of Multimedia Contents IX, SPIE, 2007, Vol. 6505(1), pp. 65051G
    BibTeX
    @conference{Chen2007b,
     author = {Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukaš},
     title = {Source digital camcorder identification using sensor photo response non-uniformity},
     booktitle = {Proceeding of the SPIE, 2007},
     journal = {Security, Steganography, and Watermarking of Multimedia Contents IX},
     publisher = {SPIE},
     year = {2007},
     volume = {6505},
     number = {1},
     pages = {65051G}}
    
  9. S.-H. Chen & C.-T. Hsu
    Source Camera Identification Based on Camera Gain Histogram
    IEEE International Conference on Image Processing
    2007, Vol. 4, pp. IV-429-IV-432
    BibTeX
    @inproceedings{Chen2007e,
     author = {Chen, Sz-Han and Hsu, Chiou-Ting},
     title = {Source Camera Identification Based on Camera Gain Histogram},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2007},
     volume = {4},
     pages = {IV-429-IV-432}}
    
  10. W. Chen & Y.Q. Shi
    Image splicing detection using 2-D phase congruency and statistical moments of characteristic function
    Proc. SPIE
    2007
    BibTeX
    @inproceedings{Chen2007a,
     author = {Wen Chen and Yun Q. Shi},
     title = {Image splicing detection using 2-D phase congruency and statistical moments of characteristic function},
     booktitle = {Proc. SPIE},
     year = {2007}}
    
  11. W. Chen, Y.Q. Shi & G. Xuan
    Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 1123-1126
    BibTeX
    @inproceedings{Chen2007c,
     author = {Wen Chen and Shi, Y. Q. and Guorong Xuan},
     title = {Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {1123--1126}}
    
  12. K. Cohen
    Digital still camera forensics
    Small Scale Digital Device Forensics Journal, 2007, Vol. 1(1), pp. 1-8
    BibTeX
    @article{Cohen2007,
     author = {Cohen, K.},
     title = {Digital still camera forensics},
     journal = {Small Scale Digital Device Forensics Journal},
     year = {2007},
     volume = {1},
     number = {1},
     pages = {1--8}}
    
  13. O. Deussen
    Bildmanipulation: Wie Computer unsere Wirklichkeit verzerren (German)
    Deussen, O. (ed.)
    Spektrum Akademischer Verlag, 2007, pp. 185
    BibTeX
    @book{Deussen2007,
     author = {Oliver Deussen},
     title = {Bildmanipulation: Wie Computer unsere Wirklichkeit verzerren (German)},
     publisher = {Spektrum Akademischer Verlag},
     year = {2007},
     pages = {185}}
    
  14. A.E. Dirik, S. Bayram, H.T. Sencar & N. Memon
    New Features to Identify Computer Generated Images
    Proc. IEEE International Conference on Image Processing ICIP 2007
    2007, Vol. 4, pp. IV-433-IV-436
    BibTeX
    @inproceedings{Dirik2007a,
     author = {Dirik, A. E. and Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {New Features to Identify Computer Generated Images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2007},
     year = {2007},
     volume = {4},
     pages = {IV--433--IV--436}}
    
  15. A.E. Dirik, H.T. Sencar & N. Memon
    Source Camera Identification Based on Sensor Dust Characteristics
    Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics SAFE ´07
    2007, pp. 1-6
    BibTeX
    @inproceedings{Dirik2007,
     author = {Dirik, A. Emir and Sencar, Husrev T. and Memon, Nasir},
     title = {Source Camera Identification Based on Sensor Dust Characteristics},
     booktitle = {Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics SAFE ´07},
     year = {2007},
     pages = {1--6}}
    
  16. B. Dybala, B. Jennings & D. Letscher
    Detecting filtered cloning in digital images
    MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security
    ACM, 2007, pp. 43-50
    BibTeX
    @inproceedings{Dybala2007,
     author = {Dybala, Brandon and Jennings, Brian and Letscher, David},
     title = {Detecting filtered cloning in digital images},
     booktitle = {MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security},
     publisher = {ACM},
     year = {2007},
     pages = {43--50}}
    
  17. H. Farid & M.J. Bravo
    Photorealistic Rendering: How Realistic Is It?
    Vision Sciences
    2007
    BibTeX
    @inproceedings{Farid2007a,
     author = {Farid, Hany and Bravo, Mary J.},
     title = {Photorealistic Rendering: How Realistic Is It?},
     booktitle = {Vision Sciences},
     year = {2007}}
    
  18. H. Farid & J.B. Woodward
    Video Stabilization and Enhancement
    Department of Computer Science, Dartmouth College, 2007(TR2007-605)
    BibTeX
    @techreport{Farid2007,
     author = {Farid, Hany and Woodward, Jeffrey B.},
     title = {Video Stabilization and Enhancement},
     year = {2007},
     number = {TR2007-605}}
    
  19. R. Fattal
    Image upsampling via imposed edge statistics
    ACM Trans. Graph., ACM, 2007, Vol. 26(3), pp. 95
    BibTeX
    @article{Fattal2007,
     author = {Fattal, Raanan},
     title = {Image upsampling via imposed edge statistics},
     journal = {ACM Trans. Graph.},
     publisher = {ACM},
     year = {2007},
     volume = {26},
     number = {3},
     pages = {95}}
    
  20. T. Florin
    Simulation of an image acquisition system
    Proc. th Int Electronics Technology Spring Seminar
    2007, pp. 357-360
    BibTeX
    @inproceedings{Florin2007,
     author = {Florin, T. },
     title = {Simulation of an image acquisition system},
     booktitle = {Proc. th Int Electronics Technology Spring Seminar},
     year = {2007},
     pages = {357--360}}
    
  21. T. Florin
    Simulation of a Digital Camera Pipeline
    Proc. Int. Symp. Signals, Circuits and Systems ISSCS 2007
    2007, Vol. 2, pp. 1-4
    BibTeX
    @inproceedings{Florin2007a,
     author = {Florin, T. },
     title = {Simulation of a Digital Camera Pipeline},
     booktitle = {Proc. Int. Symp. Signals, Circuits and Systems ISSCS 2007},
     year = {2007},
     volume = {2},
     pages = {1--4}}
    
  22. J. Franz
    Das Bild im digitalen Zeitalter - Die Frage nach der Authentizität der Fotografie
    2007
    BibTeX
    @misc{Franz2007,
     author = {Franz, Janina},
     title = {Das Bild im digitalen Zeitalter - Die Frage nach der Authentizität der Fotografie},
     year = {2007}}
    
  23. J. Fridrich, M. Chen & M. Goljan
    Imaging Sensor Noise as Digital X-ray for Revealing Forgeries
    International Workshop on Information Hiding
    2007, pp. 342-358
    BibTeX
    @inproceedings{Fridrich2007,
     author = {Fridrich, Jessica and Chen, Mo and Goljan, Miroslav},
     title = {Imaging Sensor Noise as Digital X-ray for Revealing Forgeries},
     booktitle = {International Workshop on Information Hiding},
     year = {2007},
     pages = {342-358}}
    
  24. D. Fu & Y.Q. Shi
    A generalized Benford´s law for JPEG coefficients and its applications in image forensics
    Proc. SPIE
    2007, Vol. 6505
    BibTeX
    @inproceedings{Fu2007,
     author = {Dongdong Fu and Yun Q. Shi},
     title = {A generalized Benford´s law for JPEG coefficients and its applications in image forensics},
     booktitle = {Proc. SPIE},
     year = {2007},
     volume = {6505}}
    
  25. T. Gloe, E. Franz & A. Winkler
    Forensics for Flatbed Scanners
    Delp, E. J. & Wong, P. W. (ed.)
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2007, Vol. 6505
    BibTeX
    @inproceedings{Gloe2007b,
     author = {Gloe, Thomas and Franz, Elke and Winkler, Antje},
     title = {Forensics for Flatbed Scanners},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2007},
     volume = {6505}}
    
  26. T. Gloe, M. Kirchner, A. Winkler & R. Böhme
    Can we trust digital image forensics?
    MULTIMEDIA ´07: Proceedings of the 15th international conference on Multimedia
    ACM, 2007, pp. 78-86
    BibTeX
    @inproceedings{Gloe2007,
     author = {Gloe, Thomas and Kirchner, Matthias and Winkler, Antje and Böhme, Rainer},
     title = {Can we trust digital image forensics?},
     booktitle = {MULTIMEDIA ´07: Proceedings of the 15th international conference on Multimedia},
     publisher = {ACM},
     year = {2007},
     pages = {78--86}}
    
  27. M. Goljan, M. Chen & J. Fridrich
    Identifying Common Source Digital Camera from Image Pairs
    IEEE International Conference on Image Processing
    2007
    BibTeX
    @inproceedings{Goljan2007,
     author = {Goljan, Miroslav and Chen, Mo and Fridrich, Jessica},
     title = {Identifying Common Source Digital Camera from Image Pairs},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2007}}
    
  28. E.S. Gopi
    Digital Image Forgery Detection Using Artificial Neural Network and Independent Component Analysis
    Applied Mathematics and Computation, 2007, Vol. 194(2), pp. 540-543
    BibTeX
    @article{Gopi2007,
     author = {Gopi, E. S.},
     title = {Digital Image Forgery Detection Using Artificial Neural Network and Independent Component Analysis},
     journal = {Applied Mathematics and Computation},
     year = {2007},
     volume = {194},
     number = {2},
     pages = {540-543}}
    
  29. H. Gou, A. Swaminathan & M. Wu
    Noise Features for Image Tampering Detection and Steganalysis
    Proc. IEEE Int. Conf. Image Processing ICIP 2007
    2007, Vol. 6
    BibTeX
    @inproceedings{Gou2007,
     author = {Hongmei Gou and Swaminathan, A. and Min Wu},
     title = {Noise Features for Image Tampering Detection and Steganalysis},
     booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007},
     year = {2007},
     volume = {6}}
    
  30. H. Gou, A. Swaminathan & M. Wu
    Robust scanner identification based on noise features
    Proceedings of SPIE
    2007, Vol. Volume 6505
    BibTeX
    @inproceedings{Gou2007a,
     author = {Gou, Hongmei and Swaminathan, Ashwin and Wu, Min},
     title = {Robust scanner identification based on noise features},
     booktitle = {Proceedings of SPIE},
     year = {2007},
     volume = {Volume 6505}}
    
  31. C. Grigoras
    Applications of ENF Criterion in Forensic Audio, Video, Computer and Telecommunication Analysis
    Forensic Science International, 2007, Vol. 167(2-3), pp. 136-145
    BibTeX
    @article{Grigoras2007,
     author = {Grigoras, Catalin},
     title = {Applications of ENF Criterion in Forensic Audio, Video, Computer and Telecommunication Analysis},
     journal = {Forensic Science International},
     year = {2007},
     volume = {167},
     number = {2-3},
     pages = {136-145}}
    
  32. C. Grigoras
    Applications of ENF Analysis Method in Forensic Authentication of Digital Audio and Video Recordings
    123rd AES Convention
    2007
    BibTeX
    @inproceedings{Grigoras2007a,
     author = {Grigoras, Catalin},
     title = {Applications of ENF Analysis Method in Forensic Authentication of Digital Audio and Video Recordings},
     booktitle = {123rd AES Convention},
     year = {2007}}
    
  33. G. Gül & I. Avcibas
    SVD Based Source Cell-Phone Identification
    Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007
    2007, pp. 1-4
    BibTeX
    @inproceedings{Gul2007,
     author = {Gül, Gökhan and Avcibas, Ismail},
     title = {SVD Based Source Cell-Phone Identification},
     booktitle = {Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007},
     year = {2007},
     pages = {1--4}}
    
  34. G. Gupta, S.K. Saha, S. Chakraborty & C. Mazumdar
    Document Frauds: Identification and Linking Fake Document to Scanners and Printers
    International Conference on Theory and Applications
    2007, pp. 497-501
    BibTeX
    @inproceedings{Gupta2007,
     author = {Gupta, Gaurav and Saha, Sanjoy Kumar and Chakraborty, Shayok and Mazumdar, Chandan},
     title = {Document Frauds: Identification and Linking Fake Document to Scanners and Printers},
     booktitle = {International Conference on Theory and Applications},
     year = {2007},
     pages = {497-501}}
    
  35. Y.M.Y. Hasan & A.M. Hassan
    Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique
    Proc. IEEE Int Signal Processing and Information Technology Symp
    2007, pp. 369-374
    BibTeX
    @inproceedings{Hasan2007,
     author = {Hasan, Y. M. Y. and Hassan, A. M. },
     title = {Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique},
     booktitle = {Proc. IEEE Int Signal Processing and Information Technology Symp},
     year = {2007},
     pages = {369--374}}
    
  36. Y.-F. Hsu & S.-F. Chang
    Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 28-31
    BibTeX
    @inproceedings{Hsu2007,
     author = {Yu-Feng Hsu and Shih-Fu Chang},
     title = {Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {28--31}}
    
  37. A. Ibenthal
    Image Sensor Noise Estimation and Reduction
    2007
    BibTeX
    @misc{Ibenthal2007,
     author = {Achim Ibenthal},
     title = {Image Sensor Noise Estimation and Reduction},
     year = {2007}}
    
  38. M.K. Johnson
    Lighting and Optical Tools for Image Forensics
    Department of Computer Science, Dartmouth College, 2007
    BibTeX
    @phdthesis{Johnson2007c,
     author = {Johnson, Micah Kimo},
     title = {Lighting and Optical Tools for Image Forensics},
     school = {Department of Computer Science, Dartmouth College},
     year = {2007}}
    
  39. M.K. Johnson & H. Farid
    Exposing Digital Forgeries in Complex Lighting Environments
    IEEE Transactions on Information Forensics and Security, 2007, Vol. 3(2), pp. 450-461
    BibTeX
    @article{Johnson2007,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing Digital Forgeries in Complex Lighting Environments},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2007},
     volume = {3},
     number = {2},
     pages = {450-461}}
    
  40. M.K. Johnson & H. Farid
    Exposing Digital Forgeries Through Specular Highlights on the Eye
    International Workshop on Information Hiding
    2007, pp. 311-325
    BibTeX
    @inproceedings{Johnson2007a,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing Digital Forgeries Through Specular Highlights on the Eye},
     booktitle = {International Workshop on Information Hiding},
     year = {2007},
     pages = {311-325}}
    
  41. S. Ju, J. Zhou & K. He
    An Authentication Method for Copy Areas of Images
    Proc. Fourth Int. Conf. Image and Graphics ICIG 2007
    2007, pp. 303-306
    BibTeX
    @inproceedings{Ju2007,
     author = {Shenggen Ju and Jiliu Zhou and Kun He},
     title = {An Authentication Method for Copy Areas of Images},
     booktitle = {Proc. Fourth Int. Conf. Image and Graphics ICIG 2007},
     year = {2007},
     pages = {303--306}}
    
  42. S.B. Kang
    Automatic Removal of Chromatic Aberration from a Single Image
    Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07
    2007, pp. 1-8
    BibTeX
    @inproceedings{Kang2007,
     author = {Sing Bing Kang},
     title = {Automatic Removal of Chromatic Aberration from a Single Image},
     booktitle = {Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07},
     year = {2007},
     pages = {1--8}}
    
  43. N. Khanna, A.K. Mikkilineni, P.-J. Chiang, M.V. Ortiz, V. Shah, S. Suh, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Printer and Sensor Forensics
    Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics SAFE ´07
    2007, pp. 1-8
    BibTeX
    @inproceedings{Khanna2007b,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiang, Pei-Ju and Ortiz, Maria V. and Shah, Vivek and Suh, Sungjoo and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Printer and Sensor Forensics},
     booktitle = {Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics SAFE ´07},
     year = {2007},
     pages = {1--8}}
    
  44. N. Khanna, A.K. Mikkilineni, P.-J. Chiang, M.V. Ortiz, S. Suh, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 20-23
    BibTeX
    @inproceedings{Khanna2007c,
     author = {Khanna, N. and Mikkilineni, A. K. and Pei-Ju Chiang and Ortiz, M. V. and Sungjoo Suh and Chiu, G. T.-C. and Allebach, J. P. and Delp, E. J.},
     title = {Sensor Forensics: Printers, Cameras and Scanners, They Never Lie},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {20--23}}
    
  45. N. Khanna, A.K. Mikkilineni, G.T.C. Chiu, J.P. Allebach & E.J. Delp
    Scanner Identification Using Sensor Pattern Noise
    Proceedings of SPIE
    School of Electrical and Computer Engineering School of Mechanical Engineering Purdue University, West Lafayette, Indiana USA, 2007
    BibTeX
    @inproceedings{Khanna2007,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T. C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Scanner Identification Using Sensor Pattern Noise},
     booktitle = {Proceedings of SPIE},
     year = {2007}}
    
  46. N. Khanna, A.K. Mikkilineni, G.T.C. Chiu, J.P. Allebach & E.J. Delp
    Forensic classification of imaging sensor types
    Proceedings of SPIE
    2007
    BibTeX
    @inproceedings{Khanna2007a,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T. C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Forensic classification of imaging sensor types},
     booktitle = {Proceedings of SPIE},
     year = {2007}}
    
  47. M. Kihara, M. Fujiyoshi, Q.T. Wan & H. Kiya
    Image Tamper Detection using Mathematical Morphology
    Proc. IEEE Int. Conf. Image Processing ICIP 2007
    2007, Vol. 6
    BibTeX
    @inproceedings{Kihara2007,
     author = {Kihara, M. and Fujiyoshi, M. and Qing Tao Wan and Kiya, H. },
     title = {Image Tamper Detection using Mathematical Morphology},
     booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007},
     year = {2007},
     volume = {6}}
    
  48. M. Kirchner & R. Böhme
    Tamper Hiding: Defeating Image Forensics
    Furon, T., Cayre, F., Doerr, G. & Bas, P. (ed.)
    International Workshop on Information Hiding
    2007, pp. 326-341
    BibTeX
    @inproceedings{Kirchner2007,
     author = {Kirchner, Matthias and Böhme, Rainer},
     title = {Tamper Hiding: Defeating Image Forensics},
     booktitle = {International Workshop on Information Hiding},
     year = {2007},
     pages = {326-341}}
    
  49. T.V. Lanh, K.-S. Chong, S. Emmanuel & M.S. Kankanhalli
    A Survey on Digital Camera Image Forensic Methods
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 16-19
    BibTeX
    @inproceedings{Lanh2007,
     author = {Tran Van Lanh and Kai-Sen Chong and Emmanuel, S. and Kankanhalli, M. S. },
     title = {A Survey on Digital Camera Image Forensic Methods},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {16--19}}
    
  50. G. Li, Q. Wu, D. Tu & S. Sun
    A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 1750-1753
    BibTeX
    @inproceedings{Li2007,
     author = {Guohui Li and Qiong Wu and Dan Tu and Shaojie Sun},
     title = {A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {1750--1753}}
    
  51. W.A. Liebert
    Mit Bildern lügen
    Metten, T. (ed.)
    Herbert von Halem Verlag, 2007
    BibTeX
    @book{Liebert2007,
     author = {Wolf A. Liebert},
     title = {Mit Bildern lügen},
     publisher = {Herbert von Halem Verlag},
     year = {2007},
     edition = {1. Aufl.}}
    
  52. W.S. Lin, S. Tjoa, H.V. Zhao & K.J.R. Liu
    Image Source Coding Forensics via Intrinsic Fingerprints
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 1127-1130
    BibTeX
    @inproceedings{Lin2007,
     author = {Lin, W. S. and Tjoa, S. and Zhao, H. V. and Liu, K. J. R.},
     title = {Image Source Coding Forensics via Intrinsic Fingerprints},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {1127--1130}}
    
  53. R. López-Valcarce & C. Mosquera
    Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation
    IEEE Communications Letters, 2007, Vol. 11(4), pp. 351-353
    BibTeX
    @article{Lopez-Valcarce2007,
     author = {López-Valcarce, R. and Mosquera, C.},
     title = {Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation},
     journal = {IEEE Communications Letters},
     year = {2007},
     volume = {11},
     number = {4},
     pages = {351--353}}
    
  54. W. Luo, Z. Qu, J. Huang & G. Qiu
    A Novel Method for Detecting Cropped and Recompressed Image Block
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007
    2007, Vol. 2
    BibTeX
    @inproceedings{Luo2007,
     author = {Weiqi Luo and Zhenhua Qu and Jiwu Huang and Guoping Qiu},
     title = {A Novel Method for Detecting Cropped and Recompressed Image Block},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007},
     year = {2007},
     volume = {2}}
    
  55. W. Luo, Z. Qu, F. Pan & J. Huang
    A survey of passive technology for digital image forensics
    Frontiers of Computer Science in China, Higher Education Press, co-published with Springer-Verlag GmbH, 2007, Vol. 1, pp. 166-179
    BibTeX
    @article{Luo2007a,
     author = {Luo, Weiqi and Qu, Zhenhua and Pan, Feng and Huang, Jiwu},
     title = {A survey of passive technology for digital image forensics},
     journal = {Frontiers of Computer Science in China},
     publisher = {Higher Education Press, co-published with Springer-Verlag GmbH},
     year = {2007},
     volume = {1},
     pages = {166-179}}
    
  56. B. Mahdian & S. Saic
    Detection of copy-move forgery using a method based on blur moment invariants.
    Forensic Sci Int, Institute of Information Theory and Automation, Academy of Sciences of the Czech Republic, Prague, Czech Republic. mahdian@utia.cas.cz, 2007, Vol. 171(2-3), pp. 180-189
    BibTeX
    @article{Mahdian2007,
     author = {Babak Mahdian and Stanislav Saic},
     title = {Detection of copy-move forgery using a method based on blur moment invariants.},
     journal = {Forensic Sci Int},
     year = {2007},
     volume = {171},
     number = {2-3},
     pages = {180--189}}
    
  57. B. Mahdian & S. Saic
    On Periodic Properties of Interpolation and Their Application To Image Authentication
    Proc. Third Int. Symp. Information Assurance and Security IAS 2007
    2007, pp. 439-446
    BibTeX
    @inproceedings{Mahdian2007a,
     author = {Mahdian, B. and Saic, S.},
     title = {On Periodic Properties of Interpolation and Their Application To Image Authentication},
     booktitle = {Proc. Third Int. Symp. Information Assurance and Security IAS 2007},
     year = {2007},
     pages = {439--446}}
    
  58. B. Mahdian & S. Saic
    Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants
    Forensic Science International, 2007, Vol. 171, pp. 180-189
    BibTeX
    @article{Mahdian2007c,
     author = {Mahdian, Babak and Saic, Stanislav},
     title = {Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants},
     journal = {Forensic Science International},
     year = {2007},
     volume = {171},
     pages = {180-189}}
    
  59. J. Mallon & P.F. Whelan
    Calibration and removal of lateral chromatic aberration in images
    Pattern Recognition Letters, 2007, Vol. 28(1), pp. 125 - 135
    BibTeX
    @article{Mallon2007,
     author = {John Mallon and Paul F. Whelan},
     title = {Calibration and removal of lateral chromatic aberration in images},
     journal = {Pattern Recognition Letters},
     year = {2007},
     volume = {28},
     number = {1},
     pages = {125 - 135}}
    
  60. N. Mondaini, R. Caldelli, A. Piva, M. Barni & V. Cappellini
    Detection of Malevolent Changes in Digital Video for Forensic Applications
    Delp, E. J. & Wong, P. W. (ed.)
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2007, Vol. 6505
    BibTeX
    @inproceedings{Mondaini2007,
     author = {Mondaini, N. and Caldelli, Roberto and Piva, Alessandro and Barni, Mauro and Cappellini, Vito},
     title = {Detection of Malevolent Changes in Digital Video for Forensic Applications},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2007},
     volume = {6505}}
    
  61. A. Myna, M. Venkateshmurthy & C. Patil
    Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
    Computational Intelligence and Multimedia Applications, International Conference on, IEEE Computer Society, 2007, Vol. 3, pp. 371-377
    BibTeX
    @article{Myna2007,
     author = {A.N. Myna and M.G. Venkateshmurthy and C.G Patil},
     title = {Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping},
     journal = {Computational Intelligence and Multimedia Applications, International Conference on},
     publisher = {IEEE Computer Society},
     year = {2007},
     volume = {3},
     pages = {371-377}}
    
  62. A.N. Myrna, M.G. Venkateshmurthy & C.G. Patil
    Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
    Proc. Int Conf. Computational Intelligence and Multimedia Applications Conf
    2007, Vol. 3, pp. 371-377
    BibTeX
    @inproceedings{Myrna2007,
     author = {Myrna, A. N. and Venkateshmurthy, M. G. and Patil, C. G. },
     title = {Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping},
     booktitle = {Proc. Int Conf. Computational Intelligence and Multimedia Applications Conf},
     year = {2007},
     volume = {3},
     pages = {371--377}}
    
  63. T.-t. Ng & S.-f. Chang
    Lessons Learned from Online Classification of Photo-Realistic Computer Graphics and Photographs
    Department of Electrical Engineering Columbia University New York, NY 10027, 2007
    BibTeX
    @techreport{Ng2007a,
     author = {Ng, Tian-tsong and Chang, Shih-fu},
     title = {Lessons Learned from Online Classification of Photo-Realistic Computer Graphics and Photographs},
     year = {2007}}
    
  64. T.-T. Ng, S.-F. Chang & M.-P. Tsui
    Using Geometry Invariants for Camera Response Function Estimation
    Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07
    2007, pp. 1-8
    BibTeX
    @inproceedings{Ng2007,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Tsui, Mao-Pei},
     title = {Using Geometry Invariants for Camera Response Function Estimation},
     booktitle = {Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07},
     year = {2007},
     pages = {1--8}}
    
  65. A. Oermann, C. Vielhauer & J. Dittmann
    Sensometrics: Identifying Pen Digitizers by Statistical Multimedia Signal Processing
    SPIE Conference on Multimedia on Mobile Devices III
    2007
    BibTeX
    @inproceedings{Oermann2007,
     author = {Oermann, Andrea and Vielhauer, Claus and Dittmann, Jana},
     title = {Sensometrics: Identifying Pen Digitizers by Statistical Multimedia Signal Processing},
     booktitle = {SPIE Conference on Multimedia on Mobile Devices III},
     year = {2007}}
    
  66. W.K. Pratt
    Digital Image Processing
    Wiley-Interscience, 2007
    BibTeX
    @book{Pratt2007,
     author = {Pratt, William K.},
     title = {Digital Image Processing},
     publisher = {Wiley-Interscience},
     year = {2007}}
    
  67. S. Roy & Q. Sun
    Robust Hash for Detecting and Localizing Image Tampering
    Proc. IEEE Int. Conf. Image Processing ICIP 2007
    2007, Vol. 6
    BibTeX
    @inproceedings{Roy2007,
     author = {Sujoy Roy and Qibin Sun},
     title = {Robust Hash for Detecting and Localizing Image Tampering},
     booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007},
     year = {2007},
     volume = {6}}
    
  68. D.L.M. Sacchi, F. Agnoli & E.F. Loftus
    Changing History: Doctored Photographs Affect Memory for Past Public Events
    Applied Cognitive Psychology, 2007, Vol. Volume 21 Issue 8(21), pp. 1005-1022
    BibTeX
    @article{Sacchi2007,
     author = {Sacchi, Dario L. M. and Agnoli, Franca and Loftus, Elizabeth F.},
     title = {Changing History: Doctored Photographs Affect Memory for Past Public Events},
     journal = {Applied Cognitive Psychology},
     year = {2007},
     volume = {Volume 21 Issue 8},
     number = {21},
     pages = {1005-1022}}
    
  69. D. Schlesinger
    The use of Photoshop
    2007
    BibTeX
    @electronic{Schlesinger2007,
     author = {David Schlesinger},
     title = {The use of Photoshop},
     year = {2007}}
    
  70. H.T. Sencar & N. Memon
    Overview of State-of-Art in Digital Image Forensics
    Proc. of WSPC
    2007
    BibTeX
    @inproceedings{Sencar2007,
     author = {H. T. Sencar and N. Memon},
     title = {Overview of State-of-Art in Digital Image Forensics},
     booktitle = {Proc. of WSPC},
     year = {2007}}
    
  71. Y.Q. Shi, C. Chen & W. Chen
    A natural image model approach to splicing detection
    MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security
    ACM, 2007, pp. 51-62
    BibTeX
    @inproceedings{Shi2007,
     author = {Shi, Yun Q. and Chen, Chunhua and Chen, Wen},
     title = {A natural image model approach to splicing detection},
     booktitle = {MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security},
     publisher = {ACM},
     year = {2007},
     pages = {51--62}}
    
  72. S. Singh, V. Kumar & H. Verma
    Reduction of blocking artifacts in JPEG compressed images
    Digital Signal Processing, 2007, Vol. 17(1), pp. 225 - 243
    BibTeX
    @article{Singh2007,
     author = {Sukhwinder Singh and Vinod Kumar and H.K. Verma},
     title = {Reduction of blocking artifacts in JPEG compressed images},
     journal = {Digital Signal Processing},
     year = {2007},
     volume = {17},
     number = {1},
     pages = {225 - 243}}
    
  73. C. Staelin & H. Nachlieli
    Image noise estimation using color information
    HP Laboratories Israel HPL-2005-2(R.1), 2007
    BibTeX
    @techreport{Staelin2007,
     author = {Carl Staelin and Hila Nachlieli},
     title = {Image noise estimation using color information},
     year = {2007}}
    
  74. Y. Sutcu, S. Bayram, H.T. Sencar & N. Memon
    Improvements on Sensor Noise Based Source Camera Identification
    Proc. IEEE International Conference on Multimedia and Expo
    2007, pp. 24-27
    BibTeX
    @inproceedings{Sutcu2007a,
     author = {Sutcu, Y. and Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {Improvements on Sensor Noise Based Source Camera Identification},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo},
     year = {2007},
     pages = {24--27}}
    
  75. Y. Sutcu, B. Coskun, H.T. Sencar & N. Memon
    Tamper Detection Based on Regularity of Wavelet Transform Coefficients
    IEEE International Conference on Image Processing
    2007
    BibTeX
    @inproceedings{Sutcu2007,
     author = {Sutcu, Yagiz and Coskun, Baris and Sencar, Husrev T. and Memon, Nasir},
     title = {Tamper Detection Based on Regularity of Wavelet Transform Coefficients},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2007}}
    
  76. A. Swaminathan, M. Wu & K.J.R. Liu
    A Component Estimation Framework for Information Forensics
    Proc. IEEE 9th Workshop Multimedia Signal Processing MMSP 2007
    2007, pp. 397-400
    BibTeX
    @inproceedings{Swaminathan2007,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {A Component Estimation Framework for Information Forensics},
     booktitle = {Proc. IEEE 9th Workshop Multimedia Signal Processing MMSP 2007},
     year = {2007},
     pages = {397--400}}
    
  77. A. Swaminathan, M. Wu & K.J.R. Liu
    Nonintrusive Component Forensics of Visual Sensors Using Output Images
    IEEE Transactions on Information Forensics and Security, 2007, Vol. 2(1), pp. 91-106
    BibTeX
    @article{Swaminathan2007b,
     author = {Swaminathan, Ashwin and Min Wu and K. J. Ray Liu},
     title = {Nonintrusive Component Forensics of Visual Sensors Using Output Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2007},
     volume = {2},
     number = {1},
     pages = {91--106}}
    
  78. A. Swaminathan, M. Wu & K.J.R. Liu
    Intrinsic Fingerprints for Image Authentication and Steganalysis
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2007
    BibTeX
    @inproceedings{Swaminathan2007d,
     author = {Swaminathan, Ashwin and Wu, Min and Liu, K. J. Ray},
     title = {Intrinsic Fingerprints for Image Authentication and Steganalysis},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2007}}
    
  79. A. Swaminathan, M. Wu & K.J.R. Liu
    Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras
    IEEE International Conference on Acoustics, Speech and Signal Processing
    2007, pp. 225-228
    BibTeX
    @inproceedings{Swaminathan2007e,
     author = {Swaminathan, Ashwin and Wu, Min and Liu, K. J. Ray},
     title = {Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras},
     booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing},
     year = {2007},
     pages = {225-228}}
    
  80. S. Tjoa, W.S. Lin & K.J.R. Liu
    Transform Coder Classification for Digital Image Forensics
    Proc. IEEE Int. Conf. Image Processing ICIP 2007
    2007, Vol. 6
    BibTeX
    @inproceedings{Tjoa2007a,
     author = {Tjoa, S. and Lin, W. S. and Liu, K. J. R.},
     title = {Transform Coder Classification for Digital Image Forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007},
     year = {2007},
     volume = {6}}
    
  81. S. Tjoa, W.S. Lin, H.V. Zhao & K.J.R. Liu
    Block Size Forensic Analysis in Digital Images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007
    2007, Vol. 1
    BibTeX
    @inproceedings{Tjoa2007,
     author = {Tjoa, S. and Lin, W. S. and Zhao, H. V. and Liu, K. J. R.},
     title = {Block Size Forensic Analysis in Digital Images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007},
     year = {2007},
     volume = {1}}
    
  82. M.-J. Tsai, C.-L. Lai & J. Liu
    Camera/Mobile Phone Source Identification for Digital Forensics
    IEEE International Confernece on Acoustics, Speech, and Signal Processing
    2007, Vol. 2, pp. II-221-II-224
    BibTeX
    @inproceedings{Tsai2007,
     author = {Tsai, Min-Jen and Lai, Cheng-Liang and Liu, Jung},
     title = {Camera/Mobile Phone Source Identification for Digital Forensics},
     booktitle = {IEEE International Confernece on Acoustics, Speech, and Signal Processing},
     year = {2007},
     volume = {2},
     pages = {II-221-II-224}}
    
  83. C. Upright, D. Cobzas & M. Jagersand
    Wavelet-based Light Reconstruction from a Single Image
    CRV ´07: Proceedings of the Fourth Canadian Conference on Computer and Robot Vision
    IEEE Computer Society, 2007, pp. 305-312
    BibTeX
    @inproceedings{Upright2007,
     author = {Upright, Cameron and Cobzas, Dana and Jagersand, Martin},
     title = {Wavelet-based Light Reconstruction from a Single Image},
     booktitle = {CRV ´07: Proceedings of the Fourth Canadian Conference on Computer and Robot Vision},
     publisher = {IEEE Computer Society},
     year = {2007},
     pages = {305--312}}
    
  84. L.T. Van, S. Emmanuel & M.S. Kankanhalli
    Identifying Source Cell Phone using Chromatic Aberration
    Sampat, N., DiCarlo, J. M. & Martin, R. A. (ed.)
    Proc. IEEE International Conference on Multimedia and Expo
    Digital Photography II, SPIE, 2007, Vol. 6069(1), pp. 883-886
    BibTeX
    @inproceedings{Van2007,
     author = {Lanh Tran Van and Emmanuel, S. and Kankanhalli, M. S.},
     title = {Identifying Source Cell Phone using Chromatic Aberration},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo},
     journal = {Digital Photography II},
     publisher = {SPIE},
     year = {2007},
     volume = {6069},
     number = {1},
     pages = {883--886}}
    
  85. W. Wang & H. Farid
    Exposing Digital Forgeries in Interlaced and Deinterlaced Video
    IEEE Transactions on Information Forensics and Security, 2007, Vol. 2(3), pp. 438-449
    BibTeX
    @article{Wang2007,
     author = {Weihong Wang and Farid, H.},
     title = {Exposing Digital Forgeries in Interlaced and Deinterlaced Video},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2007},
     volume = {2},
     number = {3},
     pages = {438--449}}
    
  86. W. Wang & H. Farid
    Exposing Digital Forgeries in Video by Detecting Duplication
    ACM Multimedia and Security Workshop
    2007, pp. 35-42
    BibTeX
    @inproceedings{Wang2007b,
     author = {Wang, Weihong and Farid, Hany},
     title = {Exposing Digital Forgeries in Video by Detecting Duplication},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2007},
     pages = {35-42}}
    
  87. S. Ye, Q. Sun & E.-C. Chang
    Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
    Proc. IEEE International Conference on Multimedia and Expo
    2007, Vol. EUPISCO, pp. 12-15
    BibTeX
    @inproceedings{Ye2007,
     author = {Ye, Shuiming and Sun, Qibin and Chang, Ee-Chien},
     title = {Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo},
     year = {2007},
     volume = {EUPISCO},
     pages = {12--15}}
    
  88. C. Zhang & H. Zhang
    Detecting Digital Image Forgeries Through Weighted Local Entropy
    Proc. IEEE International Symposium on Signal Processing and Information Technology
    2007, pp. 62-67
    BibTeX
    @inproceedings{Zhang2007,
     author = {Zhang, Chi and Zhang, Hongbin},
     title = {Detecting Digital Image Forgeries Through Weighted Local Entropy},
     booktitle = {Proc. IEEE International Symposium on Signal Processing and Information Technology},
     year = {2007},
     pages = {62--67}}
    
  89. L. Zhou, D. Wang, Y. Guo & J. Zhang
    Blur Detection of Digital Forgery Using Mathematical Morphology
    Nguyen, N., Grzech, A., Howlett, R. & Jain, L. (ed.)
    Agent and Multi-Agent Systems: Technologies and Applications
    Springer Berlin Heidelberg, 2007, Vol. 4496, pp. 990-998
    BibTeX
    @incollection{Zhou2007a,
     author = {Zhou, Linna and Wang, Dongming and Guo, Yunbiao and Zhang, Jingfei},
     title = {Blur Detection of Digital Forgery Using Mathematical Morphology},
     booktitle = {Agent and Multi-Agent Systems: Technologies and Applications},
     publisher = {Springer Berlin Heidelberg},
     year = {2007},
     volume = {4496},
     pages = {990-998}}
    
  90. L. Zhou, D. Wang, Y. Guo & J. Zhang
    Blur Detection of Digital Forgery Using Mathematical Morphology
    KES-AMSTA ´07: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems
    Springer-Verlag, 2007, pp. 990-998
    BibTeX
    @inproceedings{Zhou2007,
     author = {Zhou, Linna and Wang, Dongming and Guo, Yunbiao and Zhang, Jingfei},
     title = {Blur Detection of Digital Forgery Using Mathematical Morphology},
     booktitle = {KES-AMSTA ´07: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems},
     publisher = {Springer-Verlag},
     year = {2007},
     pages = {990--998}}
    


2006

  1. R.E. Alley
    Algorithm Theoretical Basis Document for Decorrelation Stretch
    Jet Propulsion Laboratory 4800 Oak Grove Drive Pasadena, CA 91109, 2006
    BibTeX
    @techreport{Alley2006,
     author = {Ronald E. Alley},
     title = {Algorithm Theoretical Basis Document for Decorrelation Stretch},
     year = {2006}}
    
  2. S. Bayram, İ. Avcıbaş, B. Sankur & N. Memon
    Image manipulation detection
    Journal of Electronic Imaging, SPIE, 2006, Vol. 15(4), pp. 041102
    BibTeX
    @article{Bayram2006a,
     author = {Bayram, Sevinc and Avcıbaş, İsmail and Sankur, Bülent and Memon, Nasir},
     title = {Image manipulation detection},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE},
     year = {2006},
     volume = {15},
     number = {4},
     pages = {041102}}
    
  3. S. Bayram, H.T. Sencar & N.D. Memon
    Improvements on source camera-model identification based on CFA interpolation
    Proc. of the WG 11.9 Intl. Conf. on Digital Forensics
    Proc. of the WG 11.9 Intl. Conf. on Digital Forensics, 2006
    BibTeX
    @inproceedings{Bayram2006,
     author = {Sevinç Bayram and Husrev T. Sencar and Nasir D. Memon},
     title = {Improvements on source camera-model identification based on CFA interpolation},
     booktitle = {Proc. of the WG 11.9 Intl. Conf. on Digital Forensics},
     journal = {Proc. of the WG 11.9 Intl. Conf. on Digital Forensics},
     year = {2006}}
    
  4. A. Castiglione, G. Cattaneo, M. Cembalo & U. Ferraro Petrillo
    Experimentations with source camera identification and Online Social Networks
    Journal of Ambient Intelligence and Humanized Computing, Springer Berlin / Heidelberg, 2006, Vol. -, pp. 1-10
    BibTeX
    @article{Castiglione,
     author = {Castiglione, Aniello and Cattaneo, Giuseppe and Cembalo, Maurizio and Ferraro Petrillo, Umberto},
     title = {Experimentations with source camera identification and Online Social Networks},
     journal = {Journal of Ambient Intelligence and Humanized Computing},
     publisher = {Springer Berlin / Heidelberg},
     year = {2006},
     volume = {-},
     pages = {1-10}}
    
  5. O. Celiktutan, I. Avcibas, B. Sankur, N.P. Ayerden & C. Capar
    Source Cell-phone Identification
    Proc. IEEE 14th Signal Processing and Communications Applications
    2006, pp. 1-3
    BibTeX
    @inproceedings{Celiktutan2006,
     author = {Celiktutan, O. and Avcibas, I. and Sankur, B. and Ayerden, N. P. and Capar, C. },
     title = {Source Cell-phone Identification},
     booktitle = {Proc. IEEE 14th Signal Processing and Communications Applications},
     year = {2006},
     pages = {1--3}}
    
  6. K.S. Choi, E.Y. Lam & K.K.Y. Wong
    Source camera identification using footprints from lens aberration
    Sampat, N., DiCarlo, J. M. & Martin, R. A. (ed.)
    Proc. SPIE
    Digital Photography II, SPIE, 2006, Vol. 6069(1), pp. 60690J
    BibTeX
    @inproceedings{Choi2006,
     author = {Kai San Choi and Edmund Y. Lam and Kenneth K. Y. Wong},
     title = {Source camera identification using footprints from lens aberration},
     booktitle = {Proc. SPIE},
     journal = {Digital Photography II},
     publisher = {SPIE},
     year = {2006},
     volume = {6069},
     number = {1},
     pages = {60690J}}
    
  7. K.S. Choi, E.Y. Lam & K.K.Y. Wong
    Source Camera Identification by JPEG Compression Statistics for Image Forensics
    IEEE Region 10 Conference (TENCON 2006)
    2006
    BibTeX
    @inproceedings{Choi2006a,
     author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.},
     title = {Source Camera Identification by JPEG Compression Statistics for Image Forensics},
     booktitle = {IEEE Region 10 Conference (TENCON 2006)},
     year = {2006}}
    
  8. K.S. Choi, E.Y. Lam & K.K.Y. Wong
    Automatic Source Camera Identification using Intrinsic Lens Radial Distortion
    Optics Express, 2006, Vol. 14(24), pp. 11551-11565
    BibTeX
    @article{Choi2006c,
     author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.},
     title = {Automatic Source Camera Identification using Intrinsic Lens Radial Distortion},
     journal = {Optics Express},
     year = {2006},
     volume = {14},
     number = {24},
     pages = {11551-11565}}
    
  9. K.S. Choi, E.Y. Lam & K.K.Y. Wong
    Feature Selection in Source Camera Identification
    IEEE International Conference on Systems, Man and Cybernetics
    2006, pp. 3176-3180
    BibTeX
    @inproceedings{Choi2006d,
     author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.},
     title = {Feature Selection in Source Camera Identification},
     booktitle = {IEEE International Conference on Systems, Man and Cybernetics},
     year = {2006},
     pages = {3176-3180}}
    
  10. A. De, H. Chadha & S. Gupta
    Detection of forgery in digital video
    The 10th World MultiConference on Systemics Cybernetics and Informatics
    2006, Vol. V, pp. 229-233
    BibTeX
    @inproceedings{De2006,
     author = {De, A. and Chadha, H. and Gupta, S.},
     title = {Detection of forgery in digital video},
     booktitle = {The 10th World MultiConference on Systemics Cybernetics and Informatics},
     year = {2006},
     volume = {V},
     pages = {229--233}}
    
  11. S. Dehnie, T. Sencar & N. Memon
    Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
    Proc. IEEE Int Image Processing Conf
    2006, pp. 2313-2316
    BibTeX
    @inproceedings{Dehnie2006,
     author = {Dehnie, S. and Sencar, T. and Memon, N. },
     title = {Digital Image Forensics for Identifying Computer Generated and Digital Camera Images},
     booktitle = {Proc. IEEE Int Image Processing Conf},
     year = {2006},
     pages = {2313--2316}}
    
  12. H. Farid
    Exposing digital forgeries in scientific images
    MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security
    ACM, 2006, pp. 29-36
    BibTeX
    @inproceedings{Farid2006,
     author = {Farid, Hany},
     title = {Exposing digital forgeries in scientific images},
     booktitle = {MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security},
     publisher = {ACM},
     year = {2006},
     pages = {29--36}}
    
  13. H. Farid
    Digital Image Ballistics from JPEG Quantization
    Department of Computer Science, Dartmouth College, 2006(TR2006-583)
    BibTeX
    @techreport{Farid2006a,
     author = {Farid, Hany},
     title = {Digital Image Ballistics from JPEG Quantization},
     year = {2006},
     number = {TR2006-583}}
    
  14. H. Farid
    Digital Doctoring: How to tell the real from the fake
    Significance, 2006, Vol. 3(4), pp. 162-166
    BibTeX
    @article{Farid2006b,
     author = {Farid, Hany},
     title = {Digital Doctoring: How to tell the real from the fake},
     journal = {Significance},
     year = {2006},
     volume = {3},
     number = {4},
     pages = {162-166}}
    
  15. R. Fergus, B. Singh, A. Hertzmann, S.T. Roweis & W.T. Freeman
    Removing camera shake from a single photograph
    SIGGRAPH ´06: ACM SIGGRAPH 2006 Papers
    ACM, 2006, pp. 787-794
    BibTeX
    @inproceedings{Fergus2006,
     author = {Fergus, Rob and Singh, Barun and Hertzmann, Aaron and Roweis, Sam T. and Freeman, William T.},
     title = {Removing camera shake from a single photograph},
     booktitle = {SIGGRAPH ´06: ACM SIGGRAPH 2006 Papers},
     publisher = {ACM},
     year = {2006},
     pages = {787--794}}
    
  16. D. Fu, Y.Q. Shi & W. Su
    Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition
    Jeon, B. (ed.)
    International Workshop on Digital Watermarking
    2006, pp. 177-187
    BibTeX
    @inproceedings{Fu2006,
     author = {Fu, Dongdong and Shi, Yun Qing and Su, Wei},
     title = {Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2006},
     pages = {177-187}}
    
  17. T. Georgiev
    Covariant Derivatives and Vision
    Leonardis, A., Bischof, H. & Pinz, A. (ed.)
    Computer Vision -- ECCV 2006
    Springer Berlin Heidelberg, 2006, Vol. 3954, pp. 56-69
    BibTeX
    @incollection{Georgiev2006,
     author = {Georgiev, Todor},
     title = {Covariant Derivatives and Vision},
     booktitle = {Computer Vision -- ECCV 2006},
     publisher = {Springer Berlin Heidelberg},
     year = {2006},
     volume = {3954},
     pages = {56-69}}
    
  18. E.S. Gopi, N. Lakshmanan, T. Gokul, S. KumaraGanesh & P.R. Shah
    Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients
    Proc. Canadian Conference on Electrical and Computer Engineering CCECE ´06
    2006, pp. 194-197
    BibTeX
    @inproceedings{Gopi2006,
     author = {Gopi, E. S. and Lakshmanan, N. and Gokul, T. and KumaraGanesh, S. and Shah, P. R.},
     title = {Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients},
     booktitle = {Proc. Canadian Conference on Electrical and Computer Engineering CCECE ´06},
     year = {2006},
     pages = {194--197}}
    
  19. L. Grady
    Random Walks for Image Segmentation
    IEEE Trans. on Pattern Analysis and Machine Intelligence, 2006, Vol. 28(11), pp. 1768-1783
    BibTeX
    @article{Grady2006,
     author = {Leo Grady},
     title = {Random Walks for Image Segmentation},
     journal = {IEEE Trans. on Pattern Analysis and Machine Intelligence},
     year = {2006},
     volume = {28},
     number = {11},
     pages = {1768--1783}}
    
  20. D. Hoiem, A.A. Efros & M. Hebert
    Putting Objects in Perspective
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition
    2006, Vol. 2, pp. 2137-2144
    BibTeX
    @inproceedings{Hoiem2006,
     author = {Hoiem, D. and Efros, A. A. and Hebert, M.},
     title = {Putting Objects in Perspective},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition},
     year = {2006},
     volume = {2},
     pages = {2137--2144}}
    
  21. Y.-F. Hsu & S.-F. Chang
    Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency
    Proc. IEEE Int Multimedia and Expo Conf
    2006, pp. 549-552
    BibTeX
    @inproceedings{Hsu2006,
     author = {Hsu, Y.-F. and Chang, S.-F. },
     title = {Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2006},
     pages = {549--552}}
    
  22. H.T. Hytti
    Characterization of digital image noise properties based on RAW data
    Proc. SPIE 6059, Image Quality and System Performance III, 2006, Vol. 6059, pp. 60590A-60590A-12
    BibTeX
    @article{Hytti2006,
     author = {Hytti, Heli T.},
     title = {Characterization of digital image noise properties based on RAW data},
     journal = {Proc. SPIE 6059, Image Quality and System Performance III},
     year = {2006},
     volume = {6059},
     pages = {60590A-60590A-12}}
    
  23. W. Jing & Z. Hongbin
    Exposing Digital Forgeries by Detecting Traces of Image Splicing
    Proc. 8th Int Signal Processing Conf
    2006, Vol. 2
    BibTeX
    @inproceedings{Jing2006,
     author = {Jing, W. and Hongbin, Z. },
     title = {Exposing Digital Forgeries by Detecting Traces of Image Splicing},
     booktitle = {Proc. 8th Int Signal Processing Conf},
     year = {2006},
     volume = {2}}
    
  24. M.K. Johnson & H. Farid
    Exposing digital forgeries through chromatic aberration
    MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security
    ACM, 2006, pp. 48-55
    BibTeX
    @inproceedings{Johnson2006,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing digital forgeries through chromatic aberration},
     booktitle = {MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security},
     publisher = {ACM},
     year = {2006},
     pages = {48--55}}
    
  25. M.K. Johnson & H. Farid
    Metric Measurements on a Plane from a Single Image
    Department of Computer Science, Dartmouth College, 2006(TR2006-579)
    BibTeX
    @techreport{Johnson2006a,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Metric Measurements on a Plane from a Single Image},
     year = {2006},
     number = {TR2006-579}}
    
  26. M.K. Johnson & H. Farid
    Exposing Digital Forgeries Through Chromatic Aberration
    ACM Multimedia and Security Workshop
    2006, pp. 48-55
    BibTeX
    @inproceedings{Johnson2006b,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing Digital Forgeries Through Chromatic Aberration},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2006},
     pages = {48-55}}
    
  27. L.W. Junfeng He, Zhouchen Lin & X. Tang
    Detecting Doctored JPEG Images Via DCT Coefficient Analysis
    Lecture Notes in Computer Science, 2006, Vol. 3953/2006, pp. 423-435
    BibTeX
    @article{JunfengHe2006,
     author = {Junfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang},
     title = {Detecting Doctored JPEG Images Via DCT Coefficient Analysis},
     journal = {Lecture Notes in Computer Science},
     year = {2006},
     volume = {3953/2006},
     pages = {423-435}}
    
  28. N. Khanna, A.K. Mikkilineni, A.F. Martone, G.N. Ali, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    A survey of forensic characterization methods for physical devices
    Digital Investigation, 2006, Vol. 3(Supplement 1), pp. 17 - 28
    BibTeX
    @article{Khanna2006,
     author = {Nitin Khanna and Aravind K. Mikkilineni and Anthony F. Martone and Gazi N. Ali and George T.-C. Chiu and Jan P. Allebach and Edward J. Delp},
     title = {A survey of forensic characterization methods for physical devices},
     journal = {Digital Investigation},
     year = {2006},
     volume = {3},
     number = {Supplement 1},
     pages = {17 - 28}}
    
  29. A. Langille & M. Gong
    An Efficient Match-based Duplication Detection Algorithm
    Canadian Conference on Computer and Robot Vision
    2006
    BibTeX
    @inproceedings{Langille2006,
     author = {Langille, Aaron and Gong, Minglun},
     title = {An Efficient Match-based Duplication Detection Algorithm},
     booktitle = {Canadian Conference on Computer and Robot Vision},
     year = {2006}}
    
  30. S. Lee, D.A. Shamma & B. Gooch
    Detecting False Captioning Using Common Sense Reasoning
    Digital Investigation, 2006, Vol. 3(Supplement 1), pp. 65-70
    BibTeX
    @article{Lee2006,
     author = {Lee, Sangwon and Shamma, David A. and Gooch, Bruce},
     title = {Detecting False Captioning Using Common Sense Reasoning},
     journal = {Digital Investigation},
     year = {2006},
     volume = {3},
     number = {Supplement 1},
     pages = {65-70}}
    
  31. C. Liu, W.T. Freeman, R. Szeliski & S.B. Kang
    Noise Estimation from a Single Image
    Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition
    2006, Vol. 1, pp. 901-908
    BibTeX
    @inproceedings{Liu2006,
     author = {Liu, Ce and Freeman, W. T. and Szeliski, R. and Kang, Sing Bing},
     title = {Noise Estimation from a Single Image},
     booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition},
     year = {2006},
     volume = {1},
     pages = {901--908}}
    
  32. Y. Long & Y. Huang
    Image Based Source Camera Identification using Demosaicking
    Proc. IEEE 8th Workshop on Multimedia Signal Processing
    2006, pp. 419-424
    BibTeX
    @inproceedings{Long2006,
     author = {Yangjing Long and Yizhen Huang},
     title = {Image Based Source Camera Identification using Demosaicking},
     booktitle = {Proc. IEEE 8th Workshop on Multimedia Signal Processing},
     year = {2006},
     pages = {419--424}}
    
  33. W. Lu, F.-L. Chung & H. Lu
    Blind Fake Image Detection Scheme Using SVD
    IEICE Transactions on Communications (Institute of Electronics, Information and Communication Engineers), 2006, Vol. E89-B, pp. 1726-1728
    BibTeX
    @article{Lu2006,
     author = {Lu, Wei and Chung, Fu-Lai and Lu, Hongtao},
     title = {Blind Fake Image Detection Scheme Using SVD},
     journal = {IEICE Transactions on Communications (Institute of Electronics, Information and Communication Engineers)},
     year = {2006},
     volume = {E89-B},
     pages = {1726-1728}}
    
  34. W. Lu, F.-l. Chung & H. Lu
    Blind fake image detection scheme using SVD
    IEICE TRANS. COMMUN, 2006, Vol. E89-B(5), pp. 1726-1728
    BibTeX
    @article{Lu2006a,
     author = {Lu, Wei and Chung, Fu-lai and Lu, Hongtao},
     title = {Blind fake image detection scheme using SVD},
     journal = {IEICE TRANS. COMMUN},
     year = {2006},
     volume = {E89-B},
     number = {5},
     pages = {1726-1728}}
    
  35. J. Lukáš, J. Fridrich & M. Goljan
    Detecting Digital Image Forgeries Using Sensor Pattern Noise
    Delp, E. J. & Wong, P. W. (ed.)
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2006, Vol. 6072
    BibTeX
    @inproceedings{Lukas2006b,
     author = {Lukáš, Jan and Fridrich, Jessica and Goljan, Miroslav},
     title = {Detecting Digital Image Forgeries Using Sensor Pattern Noise},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2006},
     volume = {6072}}
    
  36. J. Lukáš, J. Fridrich & M. Goljan
    Digital camera identification from sensor pattern noise
    IEEE Transactions on Information Forensics and Security, 2006, Vol. 1(2), pp. 205-214
    BibTeX
    @article{Lukas2006,
     author = {Lukáš, J. and Fridrich, J. and Goljan, M.},
     title = {Digital camera identification from sensor pattern noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2006},
     volume = {1},
     number = {2},
     pages = {205--214}}
    
  37. G. Luo
    Fast Wavelet Image Denoising Based on Local Variance and Edge Analysis
    International Journal of Intelligent Technology, 2006, Vol. 1(2), pp. 165-175
    BibTeX
    @article{Luo2006a,
     author = {Gaoyong Luo},
     title = {Fast Wavelet Image Denoising Based on Local Variance and Edge Analysis},
     journal = {International Journal of Intelligent Technology},
     year = {2006},
     volume = {1},
     number = {2},
     pages = {165--175}}
    
  38. W. Luo, J. Huang & G. Qiu
    Robust Detection of Region-Duplication Forgery in Digital Image
    Pattern Recognition, International Conference on, IEEE Computer Society, 2006, Vol. 4, pp. 746-749
    BibTeX
    @article{Luo2006,
     author = {Weiqi Luo and Jiwu Huang and Guoping Qiu},
     title = {Robust Detection of Region-Duplication Forgery in Digital Image},
     journal = {Pattern Recognition, International Conference on},
     publisher = {IEEE Computer Society},
     year = {2006},
     volume = {4},
     pages = {746-749}}
    
  39. A.F. Martone, A.K. Mikkilineni & E.J. Delp
    Forensics of Things
    IEEE Southwest Symposium on Image Analysis and Interpretation
    2006, pp. 149-152
    BibTeX
    @inproceedings{Martone2006,
     author = {Martone, Anthony F. and Mikkilineni, Aravind K. and Delp, Edward J.},
     title = {Forensics of Things},
     booktitle = {IEEE Southwest Symposium on Image Analysis and Interpretation},
     year = {2006},
     pages = {149-152}}
    
  40. R. Neelamani, R. de Queiroz, Z. Fan, S. Dash & R.G. Baraniuk
    JPEG compression history estimation for color images
    IEEE Transactions on Image Processing, 2006, Vol. 15(6), pp. 1365-1378
    BibTeX
    @article{Neelamani2006,
     author = {Neelamani, R. and de Queiroz, R. and Fan, Zhigang and Dash, S. and Baraniuk, R. G.},
     title = {JPEG compression history estimation for color images},
     journal = {IEEE Transactions on Image Processing},
     year = {2006},
     volume = {15},
     number = {6},
     pages = {1365--1378}}
    
  41. T.-T. Ng & S.-F. Chang
    An Online System for Classifying Computer Graphics Images from Natural Photographs
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2006
    BibTeX
    @inproceedings{Ng2006a,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu},
     title = {An Online System for Classifying Computer Graphics Images from Natural Photographs},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2006}}
    
  42. T.-t. Ng, S.-f. Chang, C.-y. Lin & Q. Sun
    Passive-blind Image Forensics
    In Multimedia Security Technologies for Digital Rights
    2006
    BibTeX
    @inproceedings{Ng2006,
     author = {Ng, Tian-tsong and Chang, Shih-fu and Lin, Ching-yung and Sun, Qibin},
     title = {Passive-blind Image Forensics},
     booktitle = {In Multimedia Security Technologies for Digital Rights},
     year = {2006}}
    
  43. T.-T. Ng, S.-F. Chang, C.-Y. Lin & Q. Sun
    Multimedia Security Technologies for Digital Rights
    Chapter Passive-Blind Image Forensics
    Elsevier, 2006, pp. 383-412
    BibTeX
    @inbook{Ng2006b,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Lin, Ching-Yung and Sun, Qibin},
     title = {Multimedia Security Technologies for Digital Rights},
     publisher = {Elsevier},
     year = {2006},
     pages = {383-412}}
    
  44. S. Prasad & K.R. Ramakrishnan
    On Resampling Detection and its Application to Detect Image Tampering
    Proc. IEEE International Conference on Multimedia and Expo
    2006, pp. 1325-1328
    BibTeX
    @inproceedings{Prasad2006,
     author = {Prasad, S. and Ramakrishnan, K. R.},
     title = {On Resampling Detection and its Application to Detect Image Tampering},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo},
     year = {2006},
     pages = {1325--1328}}
    
  45. A. Rocha & S. Goldenstein
    Is it Fake or Real?
    Brazilian Symposium of Computer Graphics and Image Processing
    2006
    BibTeX
    @inproceedings{Rocha2006,
     author = {Rocha, Anderson and Goldenstein, Siome},
     title = {Is it Fake or Real?},
     booktitle = {Brazilian Symposium of Computer Graphics and Image Processing},
     year = {2006}}
    
  46. C.K. San, E.Y. Lam & K.K.Y. Wong
    Automatic source camera identification using the intrinsic lens radial distortion
    Optics Express, 2006, Vol. 14(14), pp. 11551-11565
    BibTeX
    @article{San2006,
     author = {Choi Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.},
     title = {Automatic source camera identification using the intrinsic lens radial distortion},
     journal = {Optics Express},
     year = {2006},
     volume = {14},
     number = {14},
     pages = {11551-11565}}
    
  47. A. Swaminathan, M. Wu & K.J.R. Liu
    Image Tampering Identification using Blind Deconvolution
    Proc. IEEE Int Image Processing Conf
    2006, pp. 2309-2312
    BibTeX
    @inproceedings{Swaminathan2006,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {Image Tampering Identification using Blind Deconvolution},
     booktitle = {Proc. IEEE Int Image Processing Conf},
     year = {2006},
     pages = {2309--2312}}
    
  48. A. Swaminathan, M. Wu & K.J.R. Liu
    Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
    2006, Vol. 5
    BibTeX
    @inproceedings{Swaminathan2006a,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008},
     year = {2006},
     volume = {5}}
    
  49. A. Swaminathan, M. Wu & K.J.R. Liu
    Component Forensics of Digital Cameras: A Non-Intrusive Approach
    Proc. 40th Annual Conf. Information Sciences and Systems
    2006, pp. 1194-1199
    BibTeX
    @inproceedings{Swaminathan2006c,
     author = {Swaminathan, Ashwin and Wu, M. and Liu, K. J. R.},
     title = {Component Forensics of Digital Cameras: A Non-Intrusive Approach},
     booktitle = {Proc. 40th Annual Conf. Information Sciences and Systems},
     year = {2006},
     pages = {1194--1199}}
    
  50. M.-J. Tsai & G.-H. Wu
    Using Image Features to Identify Camera Sources
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2006, Vol. 2
    BibTeX
    @inproceedings{Tsai2006,
     author = {Tsai, Min-Jen and Wu, Guan-Hui},
     title = {Using Image Features to Identify Camera Sources},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2006},
     volume = {2}}
    
  51. G. Wang, S. Wang, X. Gao & Y. Li
    Three dimensional reconstruction of structured scenes based on vanishing points
    Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
    Springer-Verlag, 2006, pp. 935-942
    BibTeX
    @inproceedings{Wang2006a,
     author = {Wang, Guanghui and Wang, Shewei and Gao, Xiang and Li, Yubing},
     title = {Three dimensional reconstruction of structured scenes based on vanishing points},
     booktitle = {Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing},
     publisher = {Springer-Verlag},
     year = {2006},
     pages = {935--942}}
    
  52. W. Wang & H. Farid
    Exposing Digital Forgeries in Video by Detecting Double MPEG Compression
    ACM Multimedia and Security Workshop
    2006, pp. 37-47
    BibTeX
    @inproceedings{Wang2006d,
     author = {Wang, Weihong and Farid, Hany},
     title = {Exposing Digital Forgeries in Video by Detecting Double MPEG Compression},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2006},
     pages = {37-47}}
    
  53. Y. Wang & P. Moulin
    On Discrimination between Photorealistic and Photographic Images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2006
    2006, Vol. 2, pp. II
    BibTeX
    @inproceedings{Wang2006,
     author = {Wang, Ying and Moulin, P.},
     title = {On Discrimination between Photorealistic and Photographic Images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2006},
     year = {2006},
     volume = {2},
     pages = {II}}
    
  54. J. Wu, M.V. Kamath & S. Poehlman
    Detecting Differences Between Photographs and Computer Generated Images
    International Conference on Signal Processing, Pattern Recognition, and Applications
    2006, pp. 268-273
    BibTeX
    @inproceedings{Wu2006,
     author = {Wu, Jie and Kamath, Markad V. and Poehlman, Skip},
     title = {Detecting Differences Between Photographs and Computer Generated Images},
     booktitle = {International Conference on Signal Processing, Pattern Recognition, and Applications},
     year = {2006},
     pages = {268-273}}
    
  55. X.M. Zhu, G.R. Xuan, Q.M. Yao, X.F. Tong & Y.Q. Shi
    Resampling Detection in Information Forensics
    Journal of Computer Applications, 2006, Vol. 26(11), pp. 2596-2597
    BibTeX
    @article{Zhu2006,
     author = {Zhu, Xiu Ming and Xuan, Guo Rong and Yao, Qiu Ming and Tong, Xue Feng and Shi, Yun Qing},
     title = {Resampling Detection in Information Forensics},
     journal = {Journal of Computer Applications},
     year = {2006},
     volume = {26},
     number = {11},
     pages = {2596-2597}}
    


2005

  1. T. Acharya & A.K. Ray
    Image Processing
    Wiley-Interscience, 2005
    BibTeX
    @book{Acharya2005,
     author = {Acharya, Tinku and Ray, Ajoy K},
     title = {Image Processing},
     publisher = {Wiley-Interscience},
     year = {2005}}
    
  2. D. Aguilera, J. Lahoz & J. Codes
    A new method for vanishing points detection in 3d reconstruction from a single view
    Proceedings of the ISPRS Commission V, Citeseer, 2005, pp. 197-210
    BibTeX
    @article{Aguilera2005,
     author = {Aguilera, DG and Lahoz, J.G. and Codes, J.F.},
     title = {A new method for vanishing points detection in 3d reconstruction from a single view},
     journal = {Proceedings of the ISPRS Commission V},
     publisher = {Citeseer},
     year = {2005},
     pages = {197--210}}
    
  3. O. Arslan, R.M. Kumontoy, P.-J. Chiang, A.K. Mikkilineni, J.P. Allebach, G.T.-C. Chiu & E.J. Delp
    Identification of Inkjet Printers for Forensic Applications
    International Conference on Digital Printing Technologies
    2005, pp. 235-238
    BibTeX
    @inproceedings{Arslan2005,
     author = {Arslan, Osman and Kumontoy, Roy M. and Chiang, Pei-Ju and Mikkilineni, Aravind K. and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.},
     title = {Identification of Inkjet Printers for Forensic Applications},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2005},
     pages = {235-238}}
    
  4. S. Bayram, İ. Avcıbaş, B. Sankur & N. Memon
    Image manipulation detection with binary similarity measures
    Proc. European Signal Processing
    2005
    BibTeX
    @inproceedings{Bayram2005a,
     author = {Bayram, Sevinc and Avcıbaş, İsmail and Sankur, Bülent and Memon, Nasir},
     title = {Image manipulation detection with binary similarity measures},
     booktitle = {Proc. European Signal Processing},
     year = {2005}}
    
  5. S. Bayram, H. Sencar, N. Memon & I. Avcibas
    Source camera identification based on CFA interpolation
    Proc. IEEE International Conference on Image Processing ICIP 2005
    2005, Vol. 3, pp. III-69-72
    BibTeX
    @inproceedings{Bayram2005,
     author = {Bayram, S. and Sencar, H. and Memon, N. and Avcibas, I.},
     title = {Source camera identification based on CFA interpolation},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2005},
     year = {2005},
     volume = {3},
     pages = {III--69-72}}
    
  6. A. Buades, B. Coll & J.-M. Morel
    A non-local algorithm for image denoising
    Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2005
    2005, Vol. 2, pp. 60-65 vol. 2
    BibTeX
    @inproceedings{Buades2005,
     author = {Buades, A. and Coll, B. and Morel, J.-M. },
     title = {A non-local algorithm for image denoising},
     booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2005},
     year = {2005},
     volume = {2},
     pages = {60--65 vol. 2}}
    
  7. X. Cao & M. Shah
    Creating Realistic Shadows of Composited Objects
    Proc. Seventh IEEE Workshops Application of Computer Vision WACV/MOTIONS ´05 Volume 1
    2005, Vol. 1, pp. 294-299
    BibTeX
    @inproceedings{Cao2005,
     author = {Xiaochun Cao and Shah, M. },
     title = {Creating Realistic Shadows of Composited Objects},
     booktitle = {Proc. Seventh IEEE Workshops Application of Computer Vision WACV/MOTIONS ´05 Volume 1},
     year = {2005},
     volume = {1},
     pages = {294--299}}
    
  8. X. Cao & M. Shah
    Camera calibration and light source estimation from images with shadows
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005
    2005, Vol. 2, pp. 918-923
    BibTeX
    @inproceedings{Cao2005a,
     author = {Xiaochun Cao and Shah, M.},
     title = {Camera calibration and light source estimation from images with shadows},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005},
     year = {2005},
     volume = {2},
     pages = {918--923}}
    
  9. F. Cutzu, R. Hammoud & A. Leykin
    Distinguishing paintings from photographs
    Computer Vision and Image Understanding, 2005, Vol. 100(3), pp. 249 - 273
    BibTeX
    @article{Cutzu2005,
     author = {Florin Cutzu and Riad Hammoud and Alex Leykin},
     title = {Distinguishing paintings from photographs},
     journal = {Computer Vision and Image Understanding},
     year = {2005},
     volume = {100},
     number = {3},
     pages = {249 - 273}}
    
  10. A.C. Gallagher
    Detection of linear and cubic interpolation in JPEG compressed images
    Proc. 2nd Canadian Conference on Computer and Robot Vision
    2005, pp. 65-72
    BibTeX
    @inproceedings{Gallagher2005,
     author = {Gallagher, A. C.},
     title = {Detection of linear and cubic interpolation in JPEG compressed images},
     booktitle = {Proc. 2nd Canadian Conference on Computer and Robot Vision},
     year = {2005},
     pages = {65--72}}
    
  11. R. Garnett, T. Huegerich, C. Chui & W. He
    A universal noise removal algorithm with an impulse detector
    IEEE Transactions on Image Processing, 2005, Vol. 14(11), pp. 1747-1754
    BibTeX
    @article{Garnett2005,
     author = {R. Garnett and Huegerich, T. and Chui, C. and Wenjie He},
     title = {A universal noise removal algorithm with an impulse detector},
     journal = {IEEE Transactions on Image Processing},
     year = {2005},
     volume = {14},
     number = {11},
     pages = {1747--1754}}
    
  12. T. Georgiev
    Image reconstruction invariant to relighting
    Eurographics 2005
    2005, pp. 61-64
    BibTeX
    @inproceedings{Georgiev2005,
     author = {Georgiev, Todor},
     title = {Image reconstruction invariant to relighting},
     booktitle = {Eurographics 2005},
     year = {2005},
     pages = {61--64}}
    
  13. T. Georgiev
    Vision, healing brush, and fiber bundles
    Proc. SPIE 5666, Human Vision and Electronic Imaging X
    2005, Vol. 293
    BibTeX
    @inproceedings{Georgiev2005a,
     author = {Todor Georgiev},
     title = {Vision, healing brush, and fiber bundles},
     booktitle = {Proc. SPIE 5666, Human Vision and Electronic Imaging X},
     year = {2005},
     volume = {293}}
    
  14. P.F. Gorder
    Digital detectives reveal art forgeries
    Computing in Science & Engineering, 2005, Vol. 7(2), pp. 5-8
    BibTeX
    @article{Gorder2005,
     author = {Gorder, P. F.},
     title = {Digital detectives reveal art forgeries},
     journal = {Computing in Science & Engineering},
     year = {2005},
     volume = {7},
     number = {2},
     pages = {5--8}}
    
  15. L. Grady, T. Schiwietz, S. Aharon, Imaging & R. Westermann
    Random walks for interactive alpha-matting
    IASTED International Conference on Visualization, Imaging and Image Processing - VIIP
    CiteSeerX - Scientific Literature Digital Library and Search Engine [http://citeseerx.ist.psu.edu/oai2] (United States), ACTA Press, 2005
    BibTeX
    @conference{Grady2005,
     author = {Leo Grady and Thomas Schiwietz and Shmuel Aharon and Imaging and Rüdiger Westermann},
     title = {Random walks for interactive alpha-matting},
     booktitle = {IASTED International Conference on Visualization, Imaging and Image Processing - VIIP},
     publisher = {ACTA Press},
     year = {2005}}
    
  16. D. Hoiem, A.A. Efros & M. Hebert
    Automatic photo pop-up
    ACM SIGGRAPH 2005 Papers
    ACM, 2005, pp. 577-584
    BibTeX
    @inproceedings{Hoiem2005,
     author = {Hoiem, Derek and Efros, Alexei A. and Hebert, Martial},
     title = {Automatic photo pop-up},
     booktitle = {ACM SIGGRAPH 2005 Papers},
     publisher = {ACM},
     year = {2005},
     pages = {577--584}}
    
  17. D.-Y. Hsiao
    Digital Image Tampering Synthesis and Identification
    -, 2005
    BibTeX
    @phdthesis{Hsiao2005,
     author = {Dun-Yu Hsiao},
     title = {Digital Image Tampering Synthesis and Identification},
     school = {-},
     year = {2005}}
    
  18. D.-Y. Hsiao & S.-C. Pei
    Detecting Digital Tampering by Blur Estimation
    International Workshop on Systematic Approaches to Digital Forensic Engineering
    2005, pp. 264-278
    BibTeX
    @inproceedings{Hsiao2005a,
     author = {Hsiao, Dun-Yu and Pei, Soo-Chang},
     title = {Detecting Digital Tampering by Blur Estimation},
     booktitle = {International Workshop on Systematic Approaches to Digital Forensic Engineering},
     year = {2005},
     pages = {264-278}}
    
  19. Y. Huang
    Can Digital Image Forgery Detection be Unevadable? A Case Study: Color Filter Array Interpolation Statistical Feature Recovery
    Li, S., Pereira, F., Shum, H.-Y. & Tescher, A. G. (ed.)
    SPIE Conference on Visual Communications and Image Processing
    2005, Vol. 5960
    BibTeX
    @inproceedings{Huang2005,
     author = {Huang, Yizhen},
     title = {Can Digital Image Forgery Detection be Unevadable? A Case Study: Color Filter Array Interpolation Statistical Feature Recovery},
     booktitle = {SPIE Conference on Visual Communications and Image Processing},
     year = {2005},
     volume = {5960}}
    
  20. M.K. Johnson & H. Farid
    Exposing Digital Forgeries by Detecting Inconsistencies in Lighting
    ACM Multimedia and Security Workshop
    2005, pp. 1-10
    BibTeX
    @inproceedings{Johnson2005,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing Digital Forgeries by Detecting Inconsistencies in Lighting},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2005},
     pages = {1-10}}
    
  21. V. Kaufmann & R. Ladstädter
    Elimination of color fringes in digital photographs caused by lateral chromatic aberration
    Proceedings of the XX International Symposium CIPA
    2005, Vol. 26, pp. 403-408
    BibTeX
    @inproceedings{Kaufmann2005,
     author = {Kaufmann, Viktor and Ladstädter, Richard},
     title = {Elimination of color fringes in digital photographs caused by lateral chromatic aberration},
     booktitle = {Proceedings of the XX International Symposium CIPA},
     year = {2005},
     volume = {26},
     pages = {403--408}}
    
  22. P. Kellman & E.R. McVeigh
    Image reconstruction in SNR units: a general method for SNR measurement.
    Magn Reson Med, Laboratory of Cardiac Energetics, National Heart, Lung and Blood Institute, National Institutes of Health, DHHS, Bethesda, Maryland 20892-1061, USA. kellman@nih.gov, 2005, Vol. 54(6), pp. 1439-1447
    BibTeX
    @article{Kellman2005,
     author = {Peter Kellman and Elliot R McVeigh},
     title = {Image reconstruction in SNR units: a general method for SNR measurement.},
     journal = {Magn Reson Med},
     year = {2005},
     volume = {54},
     number = {6},
     pages = {1439--1447}}
    
  23. T. Kim & K.-S. Hong
    A practical single image based approach for estimating illumination distribution from shadows
    Proc. Tenth IEEE Int. Conf. Computer Vision ICCV 2005
    2005, Vol. 1, pp. 266-271
    BibTeX
    @inproceedings{Kim2005,
     author = {Taeone Kim and Ki-Sang Hong},
     title = {A practical single image based approach for estimating illumination distribution from shadows},
     booktitle = {Proc. Tenth IEEE Int. Conf. Computer Vision ICCV 2005},
     year = {2005},
     volume = {1},
     pages = {266--271}}
    
  24. S. Lin & L. Zhang
    Determining the radiometric response function from a single grayscale image
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005
    2005, Vol. 2, pp. 66-73
    BibTeX
    @inproceedings{Lin2005a,
     author = {Lin, S. and Zhang, L.},
     title = {Determining the radiometric response function from a single grayscale image},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005},
     year = {2005},
     volume = {2},
     pages = {66--73}}
    
  25. Z. Lin, R. Wang, X. Tang & H.-Y. Shum
    Detecting Doctored Images Using Camera Response Normality and Consistency
    CVPR ´05: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´05) - Volume 1
    IEEE Computer Society, 2005, pp. 1087-1092
    BibTeX
    @inproceedings{Lin2005,
     author = {Lin, Zhouchen and Wang, Rongrong and Tang, Xiaoou and Shum, Heung-Yeung},
     title = {Detecting Doctored Images Using Camera Response Normality and Consistency},
     booktitle = {CVPR ´05: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´05) - Volume 1},
     publisher = {IEEE Computer Society},
     year = {2005},
     pages = {1087--1092}}
    
  26. R. Lukac, K.N. Plataniotis, D. Hatzinakos & M. Aleksic
    A new CFA interpolation framework
    Signal Processing, 2005, Vol. 86, pp. 1559-1579
    BibTeX
    @article{Lukac2005,
     author = {Lukac, Rastislav and Plataniotis, Konstantinos N. and Hatzinakos, Dimitrios and Aleksic, Marko},
     title = {A new CFA interpolation framework},
     journal = {Signal Processing},
     year = {2005},
     volume = {86},
     pages = {1559-1579}}
    
  27. J. Lukáš, J. Fridrich & M. Goljan
    Determining digital image origin using sensor imperfections
    Said, A. & Apostolopoulos, J. G. (ed.)
    Proceedings of the SPIE
    Image and Video Communications and Processing 2005, SPIE, 2005, Vol. 5685(1), pp. 249-260
    BibTeX
    @conference{Lukas2005a,
     author = {Jan Lukáš and Jessica Fridrich and Miroslav Goljan},
     title = {Determining digital image origin using sensor imperfections},
     booktitle = {Proceedings of the SPIE},
     journal = {Image and Video Communications and Processing 2005},
     publisher = {SPIE},
     year = {2005},
     volume = {5685},
     number = {1},
     pages = {249-260}}
    
  28. J. Lukáš, J. Fridrich & M. Goljan
    Digital "bullet scratches" for images
    Proc. IEEE International Conference on Image Processing ICIP 2005
    2005, Vol. 3, pp. III-65-8
    BibTeX
    @inproceedings{Lukas2005,
     author = {Jan Lukáš and Fridrich, J. and Goljan, M.},
     title = {Digital "bullet scratches" for images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2005},
     year = {2005},
     volume = {3},
     pages = {III--65-8}}
    
  29. S. Lyu
    Natural Image Statistics for Digital Image Forensics
    Department of Computer Science, Dartmouth College, 2005
    BibTeX
    @phdthesis{Lyu2005a,
     author = {Lyu, Siwei},
     title = {Natural Image Statistics for Digital Image Forensics},
     school = {Department of Computer Science, Dartmouth College},
     year = {2005}}
    
  30. S. Lyu & H. Farid
    How Realistic is Photorealistic?
    IEEE Transactions on Signal Processing, 2005, Vol. 53(2), pp. 845-850
    BibTeX
    @article{Lyu2005,
     author = {Lyu, Siwei and Farid, Hany},
     title = {How Realistic is Photorealistic?},
     journal = {IEEE Transactions on Signal Processing},
     year = {2005},
     volume = {53},
     number = {2},
     pages = {845-850}}
    
  31. A.K. Mikkilineni, O. Arslan, P.-J. Chiang, R.M. Kumontoy, J.P. Allebach, G.T.-C. Chiu & E.J. Delp
    Printer Forensics Using SVM Techniques
    International Conference on Digital Printing Technologies
    2005, pp. 223-226
    BibTeX
    @inproceedings{Mikkilineni2005a,
     author = {Mikkilineni, Aravind K. and Arslan, Osman and Chiang, Pei-Ju and Kumontoy, Roy M. and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.},
     title = {Printer Forensics Using SVM Techniques},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2005},
     pages = {223-226}}
    
  32. A.K. Mikkilineni, P.-J. Chiang, G.N. Ali, G.T.C. Chiu, J.P. Allebach & E.J.D. III
    Printer identification based on graylevel co-occurrence features for security and forensic applications
    III, E. J. D. & Wong, P. W. (ed.)
    Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII
    Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, 2005, Vol. 5681(1), pp. 430-440
    BibTeX
    @conference{Mikkilineni2005,
     author = {Aravind K. Mikkilineni and Pei-Ju Chiang and Gazi N. Ali and George T. C. Chiu and Jan P. Allebach and Edward J. Delp III},
     title = {Printer identification based on graylevel co-occurrence features for security and forensic applications},
     booktitle = {Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII},
     journal = {Security, Steganography, and Watermarking of Multimedia Contents VII},
     publisher = {SPIE},
     year = {2005},
     volume = {5681},
     number = {1},
     pages = {430-440}}
    
  33. T.-T. Ng, S.-F. Chang, Y.-F. Hsu & M. Pepeljugoski
    Columbia Photographic Images and Photorealistic Computer Graphics Dataset
    ADVENT Technical Report, 203-2004-3, Columbia University, 2005
    BibTeX
    @techreport{Ng2005,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Hsu, Yu-Feng and Pepeljugoski, Martin},
     title = {Columbia Photographic Images and Photorealistic Computer Graphics Dataset},
     year = {2005}}
    
  34. T.-T. Ng, S.-F. Chang, Y.-F. Hsu, L. Xie & M.-P. Tsui
    Physics-motivated Features for Distinguishing Photographic Images and Computer Graphics
    ACM Multimedia
    2005
    BibTeX
    @inproceedings{Ng2005a,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Hsu, Yu-Feng and Xie, Lexing and Tsui, Mao-Pei},
     title = {Physics-motivated Features for Distinguishing Photographic Images and Computer Graphics},
     booktitle = {ACM Multimedia},
     year = {2005}}
    
  35. G. Peterson
    Forensic Analysis of Digital Image Tampering
    Advances in Digital Forensics, 2005, Vol. 194, pp. 259-270
    BibTeX
    @article{Peterson2005,
     author = {Peterson, Gilbert},
     title = {Forensic Analysis of Digital Image Tampering},
     journal = {Advances in Digital Forensics},
     year = {2005},
     volume = {194},
     pages = {259--270}}
    
  36. A.C. Popescu & H. Farid
    Statistical Tools for Digital Forensics
    Lecture Notes in Computer Science, 2005, Vol. 3200/2005, pp. 128-147
    BibTeX
    @article{Popescu2004a,
     author = {Popescu, Alin C. and Farid, Hany},
     title = {Statistical Tools for Digital Forensics},
     journal = {Lecture Notes in Computer Science},
     year = {2005},
     volume = {3200/2005},
     pages = {128-147}}
    
  37. A.C. Popescu & H. Farid
    Exposing digital forgeries in color filter array interpolated images
    IEEE Transactions on Signal Processing, 2005, Vol. 53(10), pp. 3948-3959
    BibTeX
    @article{Popescu2005,
     author = {Popescu, Alin C. and Farid, Hany},
     title = {Exposing digital forgeries in color filter array interpolated images},
     journal = {IEEE Transactions on Signal Processing},
     year = {2005},
     volume = {53},
     number = {10},
     pages = {3948--3959}}
    
  38. A.C. Popescu & H. Farid
    Exposing digital forgeries by detecting traces of resampling
    IEEE Transactions on Signal Processing, 2005, Vol. 53(2), pp. 758-767
    BibTeX
    @article{Popescu2005b,
     author = {Popescu, Alin C. and Farid, Hany},
     title = {Exposing digital forgeries by detecting traces of resampling},
     journal = {IEEE Transactions on Signal Processing},
     year = {2005},
     volume = {53},
     number = {2},
     pages = {758--767}}
    
  39. R. Puetter, T. Gosnell & A. Yahil
    Digital image reconstruction: Deblurring and denoising
    Annu. Rev. Astron. Astrophys., 2005, Vol. 43, pp. 139-94
    BibTeX
    @article{Puettner2005,
     author = {R.C. Puetter and T.R. Gosnell and Amos Yahil},
     title = {Digital image reconstruction: Deblurring and denoising},
     journal = {Annu. Rev. Astron. Astrophys.},
     year = {2005},
     volume = {43},
     pages = {139--94}}
    
  40. T. Rabie
    Robust estimation approach for blind denoising
    IEEE Transactions on Image Processing, 2005, Vol. 14(11), pp. 1755-1765
    BibTeX
    @article{Rabie2005,
     author = {Rabie, T.},
     title = {Robust estimation approach for blind denoising},
     journal = {IEEE Transactions on Image Processing},
     year = {2005},
     volume = {14},
     number = {11},
     pages = {1755--1765}}
    
  41. R. Samadani
    Characterizing and Estimating Block DCT Image Compression Quantization Parameters
    Proc. Conf Signals, Systems and Computers Record of the Thirty-Ninth Asilomar Conf
    2005, pp. 1230-1234
    BibTeX
    @inproceedings{Samadani2005,
     author = {Samadani, R.},
     title = {Characterizing and Estimating Block DCT Image Compression Quantization Parameters},
     booktitle = {Proc. Conf Signals, Systems and Computers Record of the Thirty-Ninth Asilomar Conf},
     year = {2005},
     pages = {1230--1234}}
    
  42. A.K.R. Voruganti
    Digital image tamper detection tools
    Forschungszentrum Karlsruhe, Germany, 2005
    BibTeX
    @mastersthesis{Voruganti2005,
     author = {Voruganti, Arun Kumar Raj},
     title = {Digital image tamper detection tools},
     school = {Forschungszentrum Karlsruhe, Germany},
     year = {2005}}
    
  43. G. Wang, Z. Hu, F. Wu & H.-T. Tsui
    Single view metrology from scene constraints
    Image Vision Comput., Butterworth-Heinemann, 2005, Vol. 23(9), pp. 831-840
    BibTeX
    @article{Wang2005,
     author = {Wang, Guanghui and Hu, Zhanyi and Wu, Fuchao and Tsui, Hung-Tat},
     title = {Single view metrology from scene constraints},
     journal = {Image Vision Comput.},
     publisher = {Butterworth-Heinemann},
     year = {2005},
     volume = {23},
     number = {9},
     pages = {831--840}}
    


2004

  1. G.N. Ali, P.-J. Chiang, A.K. Mikkilineni, G.T.-C. Chiu, E.J. Delp & J.P. Allebach
    Application of principal components analysis and gaussian mixture models to printer identification
    International Conference on Digital Printing Technologies
    2004, pp. 301-305
    BibTeX
    @inproceedings{Ali2004,
     author = {Ali, Gazi N. and Chiang, Pei-Ju and Mikkilineni, Aravind K. and Chiu, George T.-C. and Delp, Edward J. and Allebach, Jan P.},
     title = {Application of principal components analysis and gaussian mixture models to printer identification},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2004},
     pages = {301-305}}
    
  2. P. Alvarez
    Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis
    International Journal of Digital Evidence, 2004, Vol. 2(3), pp. 1-5
    BibTeX
    @article{Alvarez2004,
     author = {Alvarez, Paul},
     title = {Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis},
     journal = {International Journal of Digital Evidence},
     year = {2004},
     volume = {2},
     number = {3},
     pages = {1-5}}
    
  3. J.M.M. Antoni Buades, Bartomeu Coll
    On image denoising methods
    Technical Note, CMLA (Centre de Mathematiques et de Leurs Applications, 2004
    BibTeX
    @techreport{AntoniBuades2004,
     author = {Antoni Buades, Bartomeu Coll, Jean Michel Morel},
     title = {On image denoising methods},
     year = {2004}}
    
  4. I. Avcibas, S. Bayram, N. Memon, M. Ramkumar & B. Sankur
    A classifier design for detecting image manipulations
    Proc. International Conference on Image Processing ICIP ´04
    2004, Vol. 4, pp. 2645-2648 Vol. 4
    BibTeX
    @inproceedings{Avcibas2004,
     author = {Avcibas, I. and Bayram, S. and Memon, N. and Ramkumar, M. and Sankur, B.},
     title = {A classifier design for detecting image manipulations},
     booktitle = {Proc. International Conference on Image Processing ICIP ´04},
     year = {2004},
     volume = {4},
     pages = {2645--2648 Vol. 4}}
    
  5. Z. Bijhold, J.and Geradts & L. Klasen
    Forensic Imaging
    Proceedings of the 14 th International Forensic Science Symposium, Lyon
    2004
    BibTeX
    @inproceedings{Bijhold2004,
     author = {Bijhold, J.and Geradts,Z. and Klasen, L.},
     title = {Forensic Imaging},
     booktitle = {Proceedings of the 14 th International Forensic Science Symposium, Lyon},
     year = {2004}}
    
  6. H. Farid
    Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act
    Department of Computer Science, Dartmouth College, 2004(TR2004-518)
    BibTeX
    @techreport{Farid2004,
     author = {Farid, Hany},
     title = {Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act},
     year = {2004},
     number = {TR2004-518}}
    
  7. T. Georgiev
    Photoshop healing brush: a tool for seamless cloning
    2004
    BibTeX
    @misc{Georgiev2004,
     author = {Georgiev, Todor},
     title = {Photoshop healing brush: a tool for seamless cloning},
     year = {2004}}
    
  8. R.C. Gonzalez, R.E. Woods & S.L. Eddins
    Digital Image Processing Using MATLAB®
    Prentice Hall, 2004
    BibTeX
    @book{Gonzalez2004,
     author = {Gonzalez, Rafael C. and Woods, Richard E. and Eddins, Steven L.},
     title = {Digital Image Processing Using MATLAB®},
     publisher = {Prentice Hall},
     year = {2004}}
    
  9. M.D. Grossberg & S.K. Nayar
    Modeling the space of camera response functions
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004, Vol. 26(10), pp. 1272-1282
    BibTeX
    @article{Grossberg2004a,
     author = {Grossberg, M. D. and Nayar, S. K.},
     title = {Modeling the space of camera response functions},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {2004},
     volume = {26},
     number = {10},
     pages = {1272--1282}}
    
  10. Y. Ke, R. Sukthankar & L. Huston
    Efficient Near-Duplicate Detection and Sub-image Retrieval
    ACM International Conference on Multimedia
    2004, pp. 869-876
    BibTeX
    @inproceedings{Ke2004,
     author = {Ke, Yan and Sukthankar, Rahul and Huston, Larry},
     title = {Efficient Near-Duplicate Detection and Sub-image Retrieval},
     booktitle = {ACM International Conference on Multimedia},
     year = {2004},
     pages = {869-876}}
    
  11. Y. Ke, R. Sukthankar & L. Huston
    An efficient parts-based near-duplicate and sub-image retrieval system
    MULTIMEDIA ´04: Proceedings of the 12th annual ACM international conference on Multimedia
    ACM, 2004, pp. 869-876
    BibTeX
    @inproceedings{Ke2004a,
     author = {Ke, Yan and Sukthankar, Rahul and Huston, Larry},
     title = {An efficient parts-based near-duplicate and sub-image retrieval system},
     booktitle = {MULTIMEDIA ´04: Proceedings of the 12th annual ACM international conference on Multimedia},
     publisher = {ACM},
     year = {2004},
     pages = {869--876}}
    
  12. M. Kharrazi, H.T. Sencar & N. Memon
    Blind source camera identification
    Proc. International Conference on Image Processing ICIP ´04
    2004, Vol. 1, pp. 709-712
    BibTeX
    @inproceedings{Kharrazi2004,
     author = {Mehdi Kharrazi and Sencar, H. T. and Memon, N.},
     title = {Blind source camera identification},
     booktitle = {Proc. International Conference on Image Processing ICIP ´04},
     year = {2004},
     volume = {1},
     pages = {709--712}}
    
  13. D.G. Lowe
    Distinctive image features from scale-invariant keypoints
    International journal of computer vision, Springer, 2004, Vol. 60(2), pp. 91-110
    BibTeX
    @article{Lowe2004,
     author = {Lowe, David G},
     title = {Distinctive image features from scale-invariant keypoints},
     journal = {International journal of computer vision},
     publisher = {Springer},
     year = {2004},
     volume = {60},
     number = {2},
     pages = {91--110}}
    
  14. A.K. Mikkilineni, P.-J. Chiang, G.N. Ali, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Printer Identification Based on Textural Features
    International Conference on Digital Printing Technologies
    2004, pp. 306-311
    BibTeX
    @inproceedings{Mikkilineni2004,
     author = {Mikkilineni, Aravind K. and Chiang, Pei-Ju and Ali, Gazi N. and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Printer Identification Based on Textural Features},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2004},
     pages = {306-311}}
    
  15. T.-T. Ng & S.-F. Chang
    A model for image splicing
    Proc. International Conference on Image Processing ICIP ´04
    2004, Vol. 2, pp. 1169-1172
    BibTeX
    @inproceedings{Ng2004a,
     author = {Ng, T.-T. and Chang, S.-F.},
     title = {A model for image splicing},
     booktitle = {Proc. International Conference on Image Processing ICIP ´04},
     year = {2004},
     volume = {2},
     pages = {1169--1172}}
    
  16. T.-T. Ng & S.-F. Chang
    Blind Detection of Digital Photomontage using Higher Order Statistics
    Columbia University, 2004(201-2004-1)
    BibTeX
    @techreport{Ng2004b,
     author = {Tian-Tsong Ng and Shih-Fu Chang},
     title = {Blind Detection of Digital Photomontage using Higher Order Statistics},
     year = {2004},
     number = {201-2004-1}}
    
  17. T.-T. Ng & S.-F. Chang
    Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics
    ADVENT Technical Report, 220-2006-6, Columbia University, 2004
    BibTeX
    @techreport{Ng2004c,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu},
     title = {Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics},
     year = {2004}}
    
  18. T.-T. Ng & S.-F. Chang
    A Data Set of Authentic and Spliced Image Blocks
    ADVENT Technical Report, 203-2004-3, Columbia University, 2004
    BibTeX
    @techreport{Ng2004d,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu},
     title = {A Data Set of Authentic and Spliced Image Blocks},
     year = {2004}}
    
  19. T.-T. Ng, S.-F. Chang & Q. Sun
    Blind detection of photomontage using higher order statistics
    Proc. International Symposium on Circuits and Systems ISCAS ´04
    2004, Vol. 5, pp. V-688 - V-691
    BibTeX
    @inproceedings{Ng2004,
     author = {Tian-Tsong Ng and Shih-Fu Chang and Qibin Sun},
     title = {Blind detection of photomontage using higher order statistics},
     booktitle = {Proc. International Symposium on Circuits and Systems ISCAS ´04},
     year = {2004},
     volume = {5},
     pages = {V-688 -- V-691}}
    
  20. T.-T. Ng, S.-F. Chang & Q. Sun
    Blind Detection of Photomontage Using Higher Order Statistics
    International Symposium on Circuits and Systems
    2004, pp. 688 - 691
    BibTeX
    @inproceedings{Ng2004e,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Sun, Qibin},
     title = {Blind Detection of Photomontage Using Higher Order Statistics},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2004},
     pages = {688 -- 691}}
    
  21. K. Nishino & S.K. Nayar
    Eyes for relighting
    SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers
    ACM, 2004, pp. 704-711
    BibTeX
    @inproceedings{Nishino2004,
     author = {Nishino, Ko and Nayar, Shree K.},
     title = {Eyes for relighting},
     booktitle = {SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers},
     publisher = {ACM},
     year = {2004},
     pages = {704--711}}
    
  22. A.C. Popescu
    Statistical Tools for Digital Image Forensics
    Dartmouth College, 2004
    BibTeX
    @phdthesis{Popescu2004,
     author = {Popescu, Alin C.},
     title = {Statistical Tools for Digital Image Forensics},
     school = {Dartmouth College},
     year = {2004}}
    
  23. A.C. Popescu & H. Farid
    Exposing digital forgeries by detecting duplicated image regions
    Department of Computer Science Dartmouth College Hanover NH 03755, 2004(TR2004-515)
    BibTeX
    @techreport{Popescu2004b,
     author = {Popescu, Alin C. and Farid, Hany},
     title = {Exposing digital forgeries by detecting duplicated image regions},
     year = {2004},
     number = {TR2004-515}}
    
  24. J. Portilla
    Full blind denoising through noise covariance estimation using Gaussian scale mixtures in the wavelet domain
    Proc. International Conference on Image Processing ICIP ´04
    2004, Vol. 2, pp. 1217-1220 Vol.2
    BibTeX
    @inproceedings{Portilla2004,
     author = {Portilla, J.},
     title = {Full blind denoising through noise covariance estimation using Gaussian scale mixtures in the wavelet domain},
     booktitle = {Proc. International Conference on Image Processing ICIP ´04},
     year = {2004},
     volume = {2},
     pages = {1217--1220 Vol.2}}
    
  25. E. Rosendahl
    Von der Retusche zum Fake: Entwicklung, Methoden und Aspekte der Bildbearbeitung in der Pressefotografie
    Hochschule für Angewandte Wissenschaften Hamburg, GRIN Verlag, 2004
    BibTeX
    @mastersthesis{Rosendahl2004,
     author = {Rosendahl, E.},
     title = {Von der Retusche zum Fake: Entwicklung, Methoden und Aspekte der Bildbearbeitung in der Pressefotografie},
     publisher = {GRIN Verlag},
     school = {Hochschule für Angewandte Wissenschaften Hamburg},
     year = {2004}}
    
  26. M. Rossner & K.M. Yamada
    What´s in a picture? The temptation of image manipulation
    The Journal of Cell Biology, 2004, Vol. 166(1), pp. 11-15
    BibTeX
    @article{Rossner2004,
     author = {Rossner, Mike and Yamada, Kenneth M.},
     title = {What´s in a picture? The temptation of image manipulation},
     journal = {The Journal of Cell Biology},
     year = {2004},
     volume = {166},
     number = {1},
     pages = {11-15}}
    
  27. T. Soong
    Fundamentals of Probability and Statistics for Engineers
    Wiley-Interscience, 2004
    BibTeX
    @book{Soong2004,
     author = {Soong, T.T.},
     title = {Fundamentals of Probability and Statistics for Engineers},
     publisher = {Wiley-Interscience},
     year = {2004}}
    
  28. J. Sturak
    Forensic Analysis of Digital Image Tampering
    AIR FORCE INSTITUTE OF TECHNOLOGY, 2004
    BibTeX
    @mastersthesis{Sturak2004,
     author = {Sturak, JonathanR},
     title = {Forensic Analysis of Digital Image Tampering},
     school = {AIR FORCE INSTITUTE OF TECHNOLOGY},
     year = {2004}}
    
  29. J. Sun, J. Jia, C.-K. Tang & H.-Y. Shum
    Poisson matting
    SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers
    ACM, 2004, pp. 315-321
    BibTeX
    @inproceedings{Sun2004,
     author = {Sun, Jian and Jia, Jiaya and Tang, Chi-Keung and Shum, Heung-Yeung},
     title = {Poisson matting},
     booktitle = {SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers},
     publisher = {ACM},
     year = {2004},
     pages = {315--321}}
    
  30. A. Swaminathan, Y. Mao & M. Wu
    Image hashing resilient to geometric and filtering operations
    Proc. IEEE 6th Workshop Multimedia Signal Processing
    2004, pp. 355-358
    BibTeX
    @inproceedings{Swaminathan2004,
     author = {Swaminathan, Ashwin and Yinian Mao and Min Wu},
     title = {Image hashing resilient to geometric and filtering operations},
     booktitle = {Proc. IEEE 6th Workshop Multimedia Signal Processing},
     year = {2004},
     pages = {355--358}}
    
  31. G.-H. Wang, Z.-Y. Hu & F.-C. Wu
    Single view based measurement on space planes
    Journal of Computer Science and Technology, Science Press, 2004, Vol. 19, pp. 374-382
    BibTeX
    @article{Wang2004,
     author = {Wang, Guang-Hui and Hu, Zhan-Yi and Wu, Fu-Chao},
     title = {Single view based measurement on space planes},
     journal = {Journal of Computer Science and Technology},
     publisher = {Science Press},
     year = {2004},
     volume = {19},
     pages = {374-382}}
    


2003

  1. E.M. Brey, Z. Lalani, C. Johnston, M. Wong, L.V. McIntire, P.J. Duke & C.W. Patrick
    Automated selection of DAB-labeled tissue for immunohistochemical quantification.
    J Histochem Cytochem, Laboratory of Reparative Biology and Bioengineering, Department of Plastic Surgery, University of Texas M. D. Anderson Cancer Center and University of Texas Center for Biomedical Engineering, Houston 77030, USA., 2003, Vol. 51(5), pp. 575-584
    BibTeX
    @article{Brey2003,
     author = {Eric M Brey and Zahid Lalani and Carol Johnston and Mark Wong and Larry V McIntire and Pauline J Duke and Charles W Patrick},
     title = {Automated selection of DAB-labeled tissue for immunohistochemical quantification.},
     journal = {J Histochem Cytochem},
     year = {2003},
     volume = {51},
     number = {5},
     pages = {575--584}}
    
  2. Z. Fan & R. de Queiroz
    Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation
    IEEE Transactions on Image Processing, 2003, Vol. 12(2), pp. 230-235
    BibTeX
    @article{Fan2003,
     author = {Fan, Zhigang and de Queiroz, Ricardo},
     title = {Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation},
     journal = {IEEE Transactions on Image Processing},
     year = {2003},
     volume = {12},
     number = {2},
     pages = {230-235}}
    
  3. H. Farid & S. Lyu
    Higher-order Wavelet Statistics and their Application to Digital Forensics
    Proc. Conference on Computer Vision and Pattern Recognition Workshop CVPRW ´03
    2003, Vol. 8, pp. 94
    BibTeX
    @inproceedings{Farid2003,
     author = {Farid, Hany and Lyu, Siwei},
     title = {Higher-order Wavelet Statistics and their Application to Digital Forensics},
     booktitle = {Proc. Conference on Computer Vision and Pattern Recognition Workshop CVPRW ´03},
     year = {2003},
     volume = {8},
     pages = {94}}
    
  4. J. Fridrich, D. Soukal & J. Lukáš
    Detection of Copy Move Forgery in Digital Images
    Digital Forensic Research Workshop
    2003
    BibTeX
    @inproceedings{Fridrich2003,
     author = {Fridrich, Jessica and Soukal, David and Lukáš, Jan},
     title = {Detection of Copy Move Forgery in Digital Images},
     booktitle = {Digital Forensic Research Workshop},
     year = {2003}}
    
  5. M.D. Grossberg & S.K. Nayar
    What is the space of camera response functions?
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition
    2003, Vol. 2
    BibTeX
    @inproceedings{Grossberg2003,
     author = {Grossberg, M. D. and Nayar, S. K.},
     title = {What is the space of camera response functions?},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition},
     year = {2003},
     volume = {2}}
    
  6. M.D. Grossberg & S.K. Nayar
    Determining the camera response from images: what is knowable?
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, Vol. 25(11), pp. 1455-1467
    BibTeX
    @article{Grossberg2003a,
     author = {Grossberg, M. D. and Nayar, S. K.},
     title = {Determining the camera response from images: what is knowable?},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {2003},
     volume = {25},
     number = {11},
     pages = {1455--1467}}
    
  7. H.W. Hüttler & P. Rösgen
    Bilder, die lügen
    der Geschichte der Bundesrepublik Deutschland, S. H. (ed.)
    Bouvier Verlag Bonn, 2003
    BibTeX
    @book{Huettler2003,
     author = {Hüttler, Hans Walter and Rösgen, Petra},
     title = {Bilder, die lügen},
     publisher = {Bouvier Verlag Bonn},
     year = {2003}}
    
  8. K. Kurosawa & N. Saitoh
    Fundamental study on identification of CMOS cameras
    ur Rahman, Z., Schowengerdt, R. A. & Reichenbach, S. E. (ed.)
    Visual Information Processing XII
    Visual Information Processing XII, SPIE, 2003, Vol. 5108(1), pp. 202-209
    BibTeX
    @conference{Kurosawa2003,
     author = {Kenji Kurosawa and Naoki Saitoh},
     title = {Fundamental study on identification of CMOS cameras},
     booktitle = {Visual Information Processing XII},
     journal = {Visual Information Processing XII},
     publisher = {SPIE},
     year = {2003},
     volume = {5108},
     number = {1},
     pages = {202-209}}
    
  9. A. Leykin & F. Cutzu
    Differences of edge properties in photographs and paintings
    Proc. Int. Conf. Image Processing ICIP 2003
    2003, Vol. 3
    BibTeX
    @inproceedings{Leykin2003,
     author = {Leykin, A. and Cutzu, F. },
     title = {Differences of edge properties in photographs and paintings},
     booktitle = {Proc. Int. Conf. Image Processing ICIP 2003},
     year = {2003},
     volume = {3}}
    
  10. J. Lukáš & J. Fridrich
    Estimation of primary quantization matrix in double compressed jpeg images
    Proc. of DFRWS
    2003
    BibTeX
    @inproceedings{Lukas2003,
     author = {Jan Lukáš and Jessica Fridrich},
     title = {Estimation of primary quantization matrix in double compressed jpeg images},
     booktitle = {Proc. of DFRWS},
     year = {2003}}
    
  11. R. Neelamani, R. de Queiroz, Z. Fan & R. Baraniuk
    JPEG compression history estimation for color images
    Proc. International Conference on Image Processing ICIP 2003
    2003, Vol. 3, pp. III-245-8 vol.2
    BibTeX
    @inproceedings{Neelamani2003,
     author = {Neelamani, R. and de Queiroz, R. and Fan, Zhigang and Baraniuk, R.},
     title = {JPEG compression history estimation for color images},
     booktitle = {Proc. International Conference on Image Processing ICIP 2003},
     year = {2003},
     volume = {3},
     pages = {III--245-8 vol.2}}
    
  12. F. Sroubek & J. Flusser
    Multichannel blind iterative image restoration
    IEEE Transactions on Image Processing, 2003, Vol. 12(9), pp. 1094-1106
    BibTeX
    @article{Sroubek2003,
     author = {Sroubek, F. and Flusser, J.},
     title = {Multichannel blind iterative image restoration},
     journal = {IEEE Transactions on Image Processing},
     year = {2003},
     volume = {12},
     number = {9},
     pages = {1094--1106}}
    
  13. N. Tsumura, M.N. Dang, T. Makino & Y. Miyake
    Estimating the directions to light sources using images of eye for reconstructing 3D human face
    Department of Information and Image Sciences, Chiba University, 2003
    BibTeX
    @techreport{Tsumara2003,
     author = {Tsumura, Norimichi and Dang, Minh Nguyet and Makino, Takao and Miyake, Yoichi},
     title = {Estimating the directions to light sources using images of eye for reconstructing 3D human face},
     year = {2003}}
    


2002

  1. Y. Akao, K. Kobayashi, S. Sugawara & Y. Seki
    Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis
    SPIE Conference on Optical Security and Counterfeit Deterrence Techniques IV
    2002, pp. 129-137
    BibTeX
    @inproceedings{Akao2002,
     author = {Akao, Yoshinori and Kobayashi, Kazuhiko and Sugawara, Shigeru and Seki, Yoko},
     title = {Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis},
     booktitle = {SPIE Conference on Optical Security and Counterfeit Deterrence Techniques IV},
     year = {2002},
     pages = {129-137}}
    
  2. A. Cichocki & S. ichi Amari
    Adaptive Blind Signal and Image Processing
    Wiley-Interscience, 2002
    BibTeX
    @book{Cichocki2002,
     author = {Andrzej Cichocki and Shun-ichi Amari},
     title = {Adaptive Blind Signal and Image Processing},
     publisher = {Wiley-Interscience},
     year = {2002}}
    
  3. Z.J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki & N. Saitoh
    Digital Camera Identification
    Journal of Forensic Identification, 2002, Vol. 52(5), pp. 621-631
    BibTeX
    @article{Geradts2002,
     author = {Geradts, Zeno J. and Bijhold, Jurrien and Kieft, Martijn and Kurosawa, Kenji and Kuroki, Kenro and Saitoh, Naoki},
     title = {Digital Camera Identification},
     journal = {Journal of Forensic Identification},
     year = {2002},
     volume = {52},
     number = {5},
     pages = {621-631}}
    
  4. B. Jähne
    Digital Image Processing
    Springer, 2002
    BibTeX
    @book{Jaehne2002,
     author = {Jähne, Bernd},
     title = {Digital Image Processing},
     publisher = {Springer},
     year = {2002},
     edition = {5}}
    
  5. K. Kuroki, K. Kurosawa & N. Saitoh
    An Approach to Individual Video Camera Identification
    Journal of Forensic Sciences, 2002, Vol. 47(1), pp. 97-102
    BibTeX
    @article{Kuroki2002,
     author = {Kuroki, Kenro and Kurosawa, Kenji and Saitoh, Naoki},
     title = {An Approach to Individual Video Camera Identification},
     journal = {Journal of Forensic Sciences},
     year = {2002},
     volume = {47},
     number = {1},
     pages = {97-102}}
    
  6. R. Ramanath, W. Snyder, G. Bilbro & W. Sander
    Demosaicking methods for Bayer color arrays
    Journal of Electronic imaging, International Society for Optics and Photonics, 2002, Vol. 11(3), pp. 306-315
    BibTeX
    @article{Ramanath2002,
     author = {Ramanath, R. and Snyder, W.E. and Bilbro, G.L. and Sander, W.A.},
     title = {Demosaicking methods for Bayer color arrays},
     journal = {Journal of Electronic imaging},
     publisher = {International Society for Optics and Photonics},
     year = {2002},
     volume = {11},
     number = {3},
     pages = {306--315}}
    
  7. N. Saitoh, K. Kurosawa, K. Kuroki, N. Akiba, Z.J. Geradts & J. Bijhold
    CCD Fingerprint Method for Digital Still Cameras
    SPIE Conference on Investigative Image Processing II
    2002, pp. 37-48
    BibTeX
    @inproceedings{Saitoh2002,
     author = {Saitoh, Naoki and Kurosawa, Kenji and Kuroki, Kenro and Akiba, Norimitsu and Geradts, Zeno J. and Bijhold, Jurrien},
     title = {CCD Fingerprint Method for Digital Still Cameras},
     booktitle = {SPIE Conference on Investigative Image Processing II},
     year = {2002},
     pages = {37-48}}
    
  8. R.R. Schultz
    Super-resolution enhancement of native digital video versus digitized NTSC sequences
    Proc. Fifth IEEE Southwest Symp. Image Analysis and Interpretation
    2002, pp. 193-197
    BibTeX
    @inproceedings{Schultz2002,
     author = {Schultz, R. R. },
     title = {Super-resolution enhancement of native digital video versus digitized NTSC sequences},
     booktitle = {Proc. Fifth IEEE Southwest Symp. Image Analysis and Interpretation},
     year = {2002},
     pages = {193--197}}
    
  9. D. Wolin
    Document Verification and Traceability Through Image Quality Analysis
    International Conference on Digital Printing Technologies
    2002, pp. 214-217
    BibTeX
    @inproceedings{Wolin2002,
     author = {Wolin, Dave},
     title = {Document Verification and Traceability Through Image Quality Analysis},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2002},
     pages = {214-217}}
    
  10. H.-C. Wu & C.-C. Chang
    Detection and restoration of tampered JPEG compressed images
    J. Syst. Softw., Elsevier Science Inc., 2002, Vol. 64(2), pp. 151-161
    BibTeX
    @article{Wu2002,
     author = {Wu, Hsien-Chu and Chang, Chin-Chen},
     title = {Detection and restoration of tampered JPEG compressed images},
     journal = {J. Syst. Softw.},
     publisher = {Elsevier Science Inc.},
     year = {2002},
     volume = {64},
     number = {2},
     pages = {151--161}}
    


2001

  1. D. Eastlake & P. Jones
    US Secure Hash Algorithm 1 (SHA1)
    Network Working Group, 2001(Request for Comments: 3174)
    BibTeX
    @standard{Eastlake2001,
     author = {D. Eastlake and P. Jones},
     title = {US Secure Hash Algorithm 1 (SHA1)},
     year = {2001},
     number = {Request for Comments: 3174}}
    
  2. H. Farid
    Blind inverse gamma correction
    IEEE Transactions on Image Processing, 2001, Vol. 10(10), pp. 1428-1433
    BibTeX
    @article{Farid2001,
     author = {Farid, H.},
     title = {Blind inverse gamma correction},
     journal = {IEEE Transactions on Image Processing},
     year = {2001},
     volume = {10},
     number = {10},
     pages = {1428--1433}}
    
  3. H. Farid & A.C. Popescu
    Blind removal of image non-linearities
    Proc. Eighth IEEE Int. Conf. Computer Vision ICCV 2001
    2001, Vol. 1, pp. 76-81
    BibTeX
    @inproceedings{Farid2001a,
     author = {Farid, Hany and Popescu, Alin C.},
     title = {Blind removal of image non-linearities},
     booktitle = {Proc. Eighth IEEE Int. Conf. Computer Vision ICCV 2001},
     year = {2001},
     volume = {1},
     pages = {76--81}}
    
  4. Z.J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki & N. Saitoh
    Methods for Identification of Images Acquired with Digital Cameras
    Bramble, S. K., Carapezza, E. M. & Rudin, L. I. (ed.)
    SPIE Conference on Enabling Technologies for Law Enforcement and Security
    2001, Vol. 4232, pp. 505-512
    BibTeX
    @inproceedings{Geradts2001,
     author = {Geradts, Zeno J. and Bijhold, Jurrien and Kieft, Martijn and Kurosawa, Kenji and Kuroki, Kenro and Saitoh, Naoki},
     title = {Methods for Identification of Images Acquired with Digital Cameras},
     booktitle = {SPIE Conference on Enabling Technologies for Law Enforcement and Security},
     year = {2001},
     volume = {4232},
     pages = {505-512}}
    
  5. T. Kieu & D.T. Nguyen
    Surface fitting approach for reducing blocking artifacts in low bit-rate DCT decoded images
    Proc. IEEE Region 10 Int. Conf. TENCON Electrical and Electronic Technology
    2001, Vol. 1, pp. 23-27
    BibTeX
    @inproceedings{Kieu2001,
     author = {Kieu, T. and Nguyen, D. T. },
     title = {Surface fitting approach for reducing blocking artifacts in low bit-rate DCT decoded images},
     booktitle = {Proc. IEEE Region 10 Int. Conf. TENCON Electrical and Electronic Technology},
     year = {2001},
     volume = {1},
     pages = {23--27}}
    
  6. R. Kumar, H. Sawhney, S. Samarasekera, S. Hsu, H. Tao, Y. Guo, K. Hanna, A. Pope, R. Wildes, D. Hirvonen, M. Hansen & P. Burt
    Aerial video surveillance and exploitation
    Proceedings of the IEEE, 2001, Vol. 89(10), pp. 1518-1539
    BibTeX
    @article{Kumar2001,
     author = {Kumar, R. and Sawhney, H. and Samarasekera, S. and Hsu, S. and Hai Tao and Yanlin Guo and Hanna, K. and Pope, A. and Wildes, R. and Hirvonen, D. and Hansen, M. and Burt, P.},
     title = {Aerial video surveillance and exploitation},
     journal = {Proceedings of the IEEE},
     year = {2001},
     volume = {89},
     number = {10},
     pages = {1518--1539}}
    
  7. S. Mann & R. Mann
    Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001
    2001, Vol. 1
    BibTeX
    @inproceedings{Mann2001,
     author = {Mann, S. and Mann, R.},
     title = {Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001},
     year = {2001},
     volume = {1}}
    
  8. E.H. Meijering, W.J. Niessen, M.A. Viergever & others
    Quantitative evaluation of convolution-based methods for medical image interpolation
    Medical Image Analysis, Elsevier Science, 2001, Vol. 5(2), pp. 111-126
    BibTeX
    @article{Meijering2001,
     author = {Meijering, Erik HW and Niessen, Wiro J and Viergever, Max A and others},
     title = {Quantitative evaluation of convolution-based methods for medical image interpolation},
     journal = {Medical Image Analysis},
     publisher = {Elsevier Science},
     year = {2001},
     volume = {5},
     number = {2},
     pages = {111--126}}
    
  9. P. Nillius & J.O. Eklundh
    Automatic estimation of the projected light source direction
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001
    2001, Vol. 1
    BibTeX
    @inproceedings{Nillius2001,
     author = {Nillius, P. and Eklundh, J. O. },
     title = {Automatic estimation of the projected light source direction},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001},
     year = {2001},
     volume = {1}}
    
  10. C.-H. Tzeng & W.-H. Tsai
    A New Technique for Authentication of Image/Video for Multimedia Applications
    International Multimedia Conference on Multimedia and Security: New Challenges
    2001, pp. 23-26
    BibTeX
    @inproceedings{Tzeng2001,
     author = {Tzeng, Chih-Hsuan and Tsai, Wen-Hsiang},
     title = {A New Technique for Authentication of Image/Video for Multimedia Applications},
     booktitle = {International Multimedia Conference on Multimedia and Security: New Challenges},
     year = {2001},
     pages = {23-26}}
    


2000

  1. E.H. Adelson
    The New Cognitive Neurosciences
    Gazzaniga, M. S. (ed.)
    Chapter 24 Lightness Perception and Lightness Illusions
    The new cognitive neurosciences, MIT Press, 2000, pp. 339-351
    BibTeX
    @inbook{Adelson2000,
     author = {Adelson, Edward H.},
     title = {The New Cognitive Neurosciences},
     journal = {The new cognitive neurosciences},
     publisher = {MIT Press},
     year = {2000},
     pages = {339--351},
     edition = {2nd}}
    
  2. M. Desbrun, M. Meyer, P. Schröder & A.H. Barr
    Anisotropic feature-preserving denoising of height fields and bivariate data
    Graphics interface
    2000, Vol. 11(10), pp. 145-152
    BibTeX
    @inproceedings{Desbrun2000,
     author = {Desbrun, Mathieu and Meyer, Mark and Schröder, Peter and Barr, Alan H},
     title = {Anisotropic feature-preserving denoising of height fields and bivariate data},
     booktitle = {Graphics interface},
     year = {2000},
     volume = {11},
     number = {10},
     pages = {145--152}}
    
  3. Z. Fan & R. de Queiroz
    Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history
    Proc. Int Image Processing Conf
    2000, Vol. 1, pp. 948-951
    BibTeX
    @inproceedings{Fan2000,
     author = {Zhigang Fan and de Queiroz, R.},
     title = {Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history},
     booktitle = {Proc. Int Image Processing Conf},
     year = {2000},
     volume = {1},
     pages = {948--951}}
    
  4. E. Guillou, D. Meneveaux, E. Maisel & K. Bouatouch
    Using vanishing points for camera calibration and coarse 3D reconstruction from a single image
    The Visual Computer, Springer-Verlag, 2000, Vol. 16, pp. 396-410
    BibTeX
    @article{Guillou2000,
     author = {Guillou, E and Meneveaux, D. and Maisel, E. and Bouatouch, K.},
     title = {Using vanishing points for camera calibration and coarse 3D reconstruction from a single image},
     journal = {The Visual Computer},
     publisher = {Springer-Verlag},
     year = {2000},
     volume = {16},
     pages = {396-410}}
    
  5. R. Hartley & A. Zisserman
    Multiple view geometry in computer vision
    Cambridge Univ Press, 2000, Vol. 2
    BibTeX
    @book{Hartley2000,
     author = {Hartley, Richard. and Zisserman, Andrew},
     title = {Multiple view geometry in computer vision},
     publisher = {Cambridge Univ Press},
     year = {2000},
     volume = {2}}
    
  6. A. Hyvärinen & E. Oja
    Independent component analysis: algorithms and applications
    Neural Networks, 2000, Vol. 13(4-5), pp. 411 - 430
    BibTeX
    @article{Hyvaerinen2000,
     author = {A. Hyvärinen and E. Oja},
     title = {Independent component analysis: algorithms and applications},
     journal = {Neural Networks},
     year = {2000},
     volume = {13},
     number = {4-5},
     pages = {411 - 430}}
    
  7. ITU-T & ISO/IEC
    Information technology --JPEG 2000 image coding system: Core coding system Recommendation T.800
    ITU (International Telecommunication Union), 2000
    BibTeX
    @standard{ITUT2000,
     author = {ITU-T and ISO/IEC},
     title = {Information technology --JPEG 2000 image coding system: Core coding system Recommendation T.800},
     year = {2000}}
    
  8. J. Lukáš
    Digital Image Authentication Using Image Filtering Techniques
    Conference on Scientific Computing
    2000
    BibTeX
    @inproceedings{Lukas2000,
     author = {Lukáš, Jan},
     title = {Digital Image Authentication Using Image Filtering Techniques},
     booktitle = {Conference on Scientific Computing},
     year = {2000}}
    
  9. D.R. Pauluzzi & N.C. Beaulieu
    A comparison of SNR estimation techniques for the AWGN channel
    IEEE Transactions on Communications, 2000, Vol. 48(10), pp. 1681-1691
    BibTeX
    @article{Pauluzzi2000,
     author = {Pauluzzi, D. R. and Beaulieu, N. C.},
     title = {A comparison of SNR estimation techniques for the AWGN channel},
     journal = {IEEE Transactions on Communications},
     year = {2000},
     volume = {48},
     number = {10},
     pages = {1681--1691}}
    


1999

  1. D.A. Brugioni
    Photo Fakery: The History and Techniques of Photographic Deception and Manipulation
    Brassey´s, 1999
    BibTeX
    @book{Brugioni1999,
     author = {Brugioni, Dino A.},
     title = {Photo Fakery: The History and Techniques of Photographic Deception and Manipulation},
     publisher = {Brassey´s},
     year = {1999}}
    
  2. S. Chandra & C.S. Elli
    JPEG Compression Metric as a Quality Aware Image Transcoding
    Proceedings of USITS' 99: The 2nd USENIX Symposium on Internet Technologies & Systems
    1999
    BibTeX
    @inproceedings{Chandra1999,
     author = {Surendar Chandra and Carla Schlatter Elli},
     title = {JPEG Compression Metric as a Quality Aware Image Transcoding},
     booktitle = {Proceedings of USITS' 99: The 2nd USENIX Symposium on Internet Technologies & Systems},
     year = {1999}}
    
  3. A. Criminisi, I. Reid & A. Zisserman
    Single view metrology
    Proc. Seventh IEEE Int Computer Vision Conf. The
    1999, Vol. 1, pp. 434-441
    BibTeX
    @inproceedings{Criminisi1999,
     author = {Criminisi, A. and Reid, I. and Zisserman, A.},
     title = {Single view metrology},
     booktitle = {Proc. Seventh IEEE Int Computer Vision Conf. The},
     year = {1999},
     volume = {1},
     pages = {434--441}}
    
  4. H. Farid
    Detecting Digital Forgeries Using Bispectral Analysis
    AI Lab, Massachusetts Institute of Technology, 1999(AIM-1657)
    BibTeX
    @techreport{Farid1999,
     author = {Farid, Hany},
     title = {Detecting Digital Forgeries Using Bispectral Analysis},
     year = {1999},
     number = {AIM-1657}}
    
  5. M. Kivanc Mihcak, I. Kozintsev & K. Ramchandran
    Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 1999
    1999, Vol. 6, pp. 3253-3256 vol.6
    BibTeX
    @inproceedings{KivancMihcak1999,
     author = {Kivanc Mihcak, M. and Kozintsev, I. and Ramchandran, K.},
     title = {Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 1999},
     year = {1999},
     volume = {6},
     pages = {3253--3256 vol.6}}
    
  6. M. Kivanc Mihcak, I. Kozintsev, K. Ramchandran & P. Moulin
    Low-complexity image denoising based on statistical modeling of wavelet coefficients
    IEEE Signal Processing Letters, 1999, Vol. 6(12), pp. 300-303
    BibTeX
    @article{KivancMihcak1999a,
     author = {Kivanc Mihcak, M. and Kozintsev, I. and Ramchandran, K. and Moulin, P.},
     title = {Low-complexity image denoising based on statistical modeling of wavelet coefficients},
     journal = {IEEE Signal Processing Letters},
     year = {1999},
     volume = {6},
     number = {12},
     pages = {300--303}}
    
  7. K. Kurosawa, K. Kuroki & N. Saitoh
    CCD fingerprint method-identification of a video camera from videotaped images
    Proc. Int. Conf. Image Processing ICIP 99
    1999, Vol. 3, pp. 537-540
    BibTeX
    @inproceedings{Kurosawa1999,
     author = {Kurosawa, K. and Kuroki, K. and Saitoh, N. },
     title = {CCD fingerprint method-identification of a video camera from videotaped images},
     booktitle = {Proc. Int. Conf. Image Processing ICIP 99},
     year = {1999},
     volume = {3},
     pages = {537--540}}
    
  8. K. Rank, M. Lendl & R. Unbehauen
    Estimation of image noise variance
    IEE Proceedings -Vision, Image and Signal Processing, 1999, Vol. 146(2), pp. 80-84
    BibTeX
    @article{Rank1999,
     author = {Rank, K. and Lendl, M. and Unbehauen, R. },
     title = {Estimation of image noise variance},
     journal = {IEE Proceedings -Vision, Image and Signal Processing},
     year = {1999},
     volume = {146},
     number = {2},
     pages = {80--84}}
    
  9. D.-G. Sim, O.-K. Kwon & R.-H. Park
    Object matching algorithms using robust Hausdorff distance measures
    IEEE Transactions on Image Processing, 1999, Vol. 8(3), pp. 425-429
    BibTeX
    @article{Sim1999,
     author = {Sim, Dong-Gyu and Kwon, Oh-Kyu and Park, Rae-Hong},
     title = {Object matching algorithms using robust Hausdorff distance measures},
     journal = {IEEE Transactions on Image Processing},
     year = {1999},
     volume = {8},
     number = {3},
     pages = {425--429}}
    


1998

  1. J. Adams, J.E.
    Design of practical color filter array interpolation algorithms for digital cameras .2
    Proc. International Conference on Image Processing ICIP 98
    1998, Vol. 1, pp. 488-492
    BibTeX
    @inproceedings{Adams1998,
     author = {Adams, J. E. , Jr.},
     title = {Design of practical color filter array interpolation algorithms for digital cameras .2},
     booktitle = {Proc. International Conference on Image Processing ICIP 98},
     year = {1998},
     volume = {1},
     pages = {488--492}}
    
  2. ITU-T & ISO/IEC
    Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.87
    ITU (International Telecommunication Union), 1998
    BibTeX
    @standard{ITUT1998,
     author = {ITU-T and ISO/IEC},
     title = {Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.87},
     year = {1998}}
    
  3. P. Thevenaz, U.E. Ruttimann & M. Unser
    A pyramid approach to subpixel registration based on intensity
    IEEE Transactions on Image Processing, 1998, Vol. 7(1), pp. 27-41
    BibTeX
    @article{Thevenaz1998,
     author = {Thevenaz, P. and Ruttimann, Urs E. and Unser, M.},
     title = {A pyramid approach to subpixel registration based on intensity},
     journal = {IEEE Transactions on Image Processing},
     year = {1998},
     volume = {7},
     number = {1},
     pages = {27--41}}
    


1997

  1. A. Jaubert
    Fotos, die lügen. Politik mit gefälschten Bildern (German Edition)
    Jaubert, A. (ed.)
    Hain Verlag, Bodenheim, 1997
    BibTeX
    @book{Jaubert1992,
     author = {Jaubert, Alain},
     title = {Fotos, die lügen. Politik mit gefälschten Bildern (German Edition)},
     publisher = {Hain Verlag, Bodenheim},
     year = {1997}}
    
  2. L. Kurz & M.H. Benteftifa
    Analysis of Variance in Statistical Image Processing
    Cambridge University Press, 1997
    BibTeX
    @book{Kurz1997,
     author = {Ludwik Kurz and M. Hafed Benteftifa},
     title = {Analysis of Variance in Statistical Image Processing},
     publisher = {Cambridge University Press},
     year = {1997}}
    


1996

  1. J. Immerkær
    Fast Noise Variance Estimation
    Computer Vision and Image Understanding, 1996, Vol. 64(2), pp. 300 - 302
    BibTeX
    @article{Immerkaer1996,
     author = {Immerkær, John},
     title = {Fast Noise Variance Estimation},
     journal = {Computer Vision and Image Understanding},
     year = {1996},
     volume = {64},
     number = {2},
     pages = {300 - 302}}
    
  2. E.P. Simoncelli & E.H. Adelson
    Noise removal via Bayesian wavelet coring
    Proc. Conf. Int Image Processing
    1996, Vol. 1, pp. 379-382
    BibTeX
    @inproceedings{Simoncelli1996,
     author = {Simoncelli, E. P. and Adelson, E. H.},
     title = {Noise removal via Bayesian wavelet coring},
     booktitle = {Proc. Conf. Int Image Processing},
     year = {1996},
     volume = {1},
     pages = {379--382}}
    
  3. E.P. Simoncelli & H. Farid
    Steerable wedge filters for local orientation analysis
    IEEE Trans. Image Processing, 1996, Vol. 5(9), pp. 1377-1382
    BibTeX
    @article{Simoncelli1996a,
     author = {Simoncelli, E. P. and Farid, Hany},
     title = {Steerable wedge filters for local orientation analysis},
     journal = {IEEE Trans. Image Processing},
     year = {1996},
     volume = {5},
     number = {9},
     pages = {1377--1382}}
    


1995

  1. C.A. Glasbey & G.W. Horgan
    Image Analysis for the Biological Sciences
    John Wiley & Sons, 1995
    BibTeX
    @book{Glasbey1995,
     author = {Glasbey, C. A. and Horgan, G. W.},
     title = {Image Analysis for the Biological Sciences},
     publisher = {John Wiley & Sons},
     year = {1995}}
    


1993

  1. D.P. Huttenlocher, G.A. Klanderman & W.J. Rucklidge
    Comparing images using the Hausdorff distance
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 1993, Vol. 15(9), pp. 850-863
    BibTeX
    @article{Huttenlocher1993,
     author = {Huttenlocher, D. P. and Klanderman, G. A. and Rucklidge, W. J.},
     title = {Comparing images using the Hausdorff distance},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {1993},
     volume = {15},
     number = {9},
     pages = {850--863}}
    
  2. D.P. Huttenlocher & W.J. Rucklidge
    A multi-resolution technique for comparing images using the Hausdorff distance
    Proc. CVPR ´93. IEEE Computer Society Conference on Computer Vision and Pattern Recognition
    1993, pp. 705-706
    BibTeX
    @inproceedings{Huttenlocher1993b,
     author = {Huttenlocher, D. P. and Rucklidge, W. J. },
     title = {A multi-resolution technique for comparing images using the Hausdorff distance},
     booktitle = {Proc. CVPR ´93. IEEE Computer Society Conference on Computer Vision and Pattern Recognition},
     year = {1993},
     pages = {705--706}}
    


1992

  1. Adobe Systems Incorporated
    TIFF
    Adobe Developers Association, 1992(6)
    BibTeX
    @standard{Adobe1992,
     author = {Adobe Systems Incorporated},
     title = {TIFF},
     year = {1992},
     number = {6}}
    
  2. T.E. Boult & G. Wolberg
    Correcting chromatic aberrations using image warping
    Proc. CVPR ´92. IEEE Computer Society Conf Computer Vision and Pattern Recognition
    1992, pp. 684-687
    BibTeX
    @inproceedings{Boult1992,
     author = {Boult, T. E. and Wolberg, G. },
     title = {Correcting chromatic aberrations using image warping},
     booktitle = {Proc. CVPR ´92. IEEE Computer Society Conf Computer Vision and Pattern Recognition},
     year = {1992},
     pages = {684--687}}
    
  3. E. Hamilton
    JPEG File Interchange Format
    C-Cube Microsystems, 1992(1)
    BibTeX
    @standard{Hamilton1992,
     author = {Eric Hamilton},
     title = {JPEG File Interchange Format},
     year = {1992},
     number = {1}}
    
  4. ITU-T & ISO/IEC
    Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.81
    ITU (International Telecommunication Union), 1992
    BibTeX
    @standard{ITUT1992,
     author = {ITU-T and ISO/IEC},
     title = {Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.81},
     year = {1992}}
    
  5. L.I. Rudin, S. Osher & E. Fatemi
    Nonlinear total variation based noise removal algorithms
    Physica D: Nonlinear Phenomena, 1992, Vol. 60(1-4), pp. 259 - 268
    BibTeX
    @article{Rudin1992,
     author = {Leonid I. Rudin and Stanley Osher and Emad Fatemi},
     title = {Nonlinear total variation based noise removal algorithms},
     journal = {Physica D: Nonlinear Phenomena},
     year = {1992},
     volume = {60},
     number = {1-4},
     pages = {259 - 268}}
    


1990

  1. P. Meer, J. Jolion & A. Rosenfeld
    A Fast Parallel Algorithm for Blind Estimation of Noise Variance
    IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Computer Society, 1990, Vol. 12, pp. 216-223
    BibTeX
    @article{Meer1990,
     author = {P. Meer and J.M. Jolion and A. Rosenfeld},
     title = {A Fast Parallel Algorithm for Blind Estimation of Noise Variance},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     publisher = {IEEE Computer Society},
     year = {1990},
     volume = {12},
     pages = {216-223}}
    


1989

  1. A.K. Jain
    Fundamentals of Digital Image Processing
    Prentice Hall, 1989
    BibTeX
    @book{Jain1989,
     author = {Jain, Anil K.},
     title = {Fundamentals of Digital Image Processing},
     publisher = {Prentice Hall},
     year = {1989}}
    


1988

  1. A.K. Jain & R.C. Dubes
    Algorithms for Clustering Data
    Prentice Hall, 1988
    BibTeX
    @book{Jain1988,
     author = {Jain, Anil K. and Dubes, Richard C.},
     title = {Algorithms for Clustering Data},
     publisher = {Prentice Hall},
     year = {1988}}
    
  2. L.J. Van Vliet, I.T. Young & G.L. Beckers
    An edge detection model based on non-linear laplacefiltering
    Gelsema, E. & Kanal, L. (ed.)
    Pattern Recognition and Artificial Intelligence
    Pattern Recognition and Artificial Intelligence, Elsevier Science Publishers B.V. (North-Holland), 1988, pp. 63-73
    BibTeX
    @inproceedings{VanVliet1988,
     author = {Van Vliet, Lucas J. and Young, Ian T. and Beckers, Guus L.},
     title = {An edge detection model based on non-linear laplacefiltering},
     booktitle = {Pattern Recognition and Artificial Intelligence},
     journal = {Pattern Recognition and Artificial Intelligence},
     publisher = {Elsevier Science Publishers B.V. (North-Holland)},
     year = {1988},
     pages = {63-73}}
    


1976

  1. B.E. Bayer
    Color imaging array
    1976(3,971,065)
    BibTeX
    @patent{Bayer1976,
     author = {Bryce E. Bayer},
     title = {Color imaging array},
     year = {1976},
     number = {3,971,065}}
    

Version

3.09.1 Build 3396 - 28. Sep. 201p

Die Datenbank enthält 3396 bilbliografische Einträge zum Thema Bildforensik seit Patentierung des Bayer-Sensors 1986. Es stehen noch 632 Veröffenlichungen zur Aufnahme in die Datenbank aus.

Statiststics

Year Paper
2020 16 16
2019 96 96
2018 310 310
2017 348 348
2016 365 365
2015 354 354
2014 236 250
2013 280 279
2012 234 234
2011 190 196
2010 191 204
2009 172 180
2008 116 116
2007 94 94
2006 55 55
2005 23 46
2004 32 32
2003 14 14
2002 12 12
2001 12 12
2000 11 11
1999 11 11

 

Wir freuen uns über Vorschläge zur Verbesserung der Datenbank. Kontakt: