|
[1] A.C. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Traces of Re-sampling”, IEEE Trans. on Signal Processing, vol. 53, no.2 ,pp 758-767, 2005. [2] A.C. Popescu and H. Farid, “Exposing Digital Forgeries in Color Filter Array Interpolated Images,” IEEE Trans. on Signal Processing, vol. 53, no. 10, pp. 3948-3959, 2005. [3] A. Swaminathan, M.Wu, and K.J.R. Liu, “Non-intrusive Component Forensics of Visual Sensors Using Output Images,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 1, pp. 91-106, March 2007. [4] J. Lukas and J. Fridrich, “Digital Camera Identification From Sensor Pattern Noise”, IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 205-214, June 2006. [5] M.K. Johnson and H. Farid, “Exposing Digital Forgeries by Detecting Inconsistencies in Lighting”, ACM Multimedia and Security Workshop, New York, NY, 2005. [6] S. Lyu and H. Farid, “How Realistic is Photorealistic?”, IEEE Trans. on Signal Processing, vol. 53, no. 2, pp. 845-850, Feb. 2005. [7] J. Fridrich, M. Goljan, and R. Du, “Steganalysis based on JPEG compatibility,” SPIE Multimedia Systems and Applications IV, Denver, CO, August 2001, pp. 275-280. [8] Z. Fan and R.L. de Queiroz, “Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation,” IEEE Trans. on Image Processing, vol. 12, no. 2, pp. 230-235, Feb. 2003. [9] S. Ye, Q. Sun, and E.C. Chang, “Detecting Digital Image by Measuring Inconsistencies of Blocking Artifact”, Proc. ICME, pp. 12-15, July 2007. [10] W. Luo, Z. Qu, J. Huang, and G. Qiu, “A Novel Method for Detecting Cropped and Recompressed Image Block,” Proc. ICASSP, vol.2, pp. 217-220, April 2007. [11] Y. L. Chen, and C. T. Hsu, “Image Tampering Detection by Blocking Periodicity Analysis in JPEG Compressed Images,” Proc. MMSP, 2008. [12] D. Fu, Y. Q. Shi, and W. Su, “ A Generalized Benford’s Law for JPEG Coefficients and Its Applications in Image Forensics,” SPIE, 2007. [13] B. Li, Y. Q. Shi, and J. Huang,, “Detecting Doubly Compressed JPEG Images by Mode Based First Digit Features,” Proc. MMSP, 2008. [14] H. Farid, “Exposing digital forgery from JPEG ghosts,” IEEE Trans. on Information Forensic and Security, vol.1, 2009. [15] A. Zakhor, “Iterative procedures for reduction of blocking effects in transform image coding,” IEEE Trans. on Circuit and System for Video Technology, vol. 2, no. 1, March 1992. [16] A. Papoulis, “Probability, random variables, and stochastic process,” 4th edition, 2002. [17] Y. Kin, C. S. Park, and S. J. Ko, “Fast POCS based post-processing technique for HDTV,” IEEE Trans. on Consumer Electronics, vol. 49, no. 4, November 2003. [18] Y. C. Liaw, W. Lo and Z. C. Lai, “Image restoration of compressed image using classified vector quantization,” Pattern Recognition, pp 329-340, 2002.
|