23.3.9.2 Tamper Detection, Forensics

Chapter Contents (Back)
Watermark. Tamper Detection. Image Forensics. Forensics. Mostly not watermark based tamper detction, but it can be. See also Forgery Detection for Images.

Yang, C.K.[Chen-Kuei], Huang, C.S.[Chang-Sheng],
A Novel Watermarking Technique for Tampering Detection in Digital Images,
ELCVIA(3), No. 1, 2004, pp. 1-12.
WWW Link. 0402
BibRef

Knowles, H.D., Winne, D.A., Canagarajah, C.N., Bull, D.R.,
Image tamper detection and classification using support vector machines,
VISP(151), No. 4, August 2004, pp. 322-328.
IEEE Abstract. 0411
BibRef

Lin, P.L.[Phen Lan], Hsieh, C.K.[Chung-Kai], Huang, P.W.[Po-Whei],
A hierarchical digital watermarking method for image tamper detection and recovery,
PR(38), No. 12, December 2005, pp. 2519-2529.
WWW Link. 0510
BibRef

Chang, C.C.[Chin-Chen], Hu, Y.S.[Yih-Shin], Lu, T.C.[Tzu-Chuen],
A watermarking-based image ownership and tampering authentication scheme,
PRL(27), No. 5, 1 April 2006, pp. 439-446.
WWW Link. 0604
Image authentication; Ownership protection; Tampering detection BibRef

Chan, C.S.[Chi-Shiang], Chang, C.C.[Chin-Chen],
An efficient image authentication method based on Hamming code,
PR(40), No. 2, February 2007, pp. 681-690.
WWW Link. 0611
Image authentication; Tamper proofing; Hamming code; Torus automorphism BibRef

Peng, X.X.[Xin-Xin], Lu, J.F.[Jian-Feng], Li, L.[Li], Chang, C.C.[Chin-Chen], Zhou, Q.[Qili],
A New Card Authentication Scheme Based on Image Watermarking and Encryption,
IWDW16(358-369).
Springer DOI 1703
BibRef

Chan, C.S.[Chi-Shiang],
An image authentication method by applying Hamming code on rearranged bits,
PRL(32), No. 14, 15 October 2011, pp. 1679-1690.
Elsevier DOI 1110
Image authentication; Tamper proofing; Hamming code BibRef

Yang, H.J.[Hui-Juan], Kot, A.C.[Alex C.],
Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier,
SPLetters(13), No. 12, December 2006, pp. 741-744.
IEEE DOI 0701
BibRef

Chang, C.C.[Chin-Chen], Fan, Y.H.[Yi-Hsuan], Tai, W.L.[Wei-Liang],
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery,
PR(41), No. 2, February 2008, pp. 654-661.
WWW Link. 0711
Fragile watermarking; Image authentication; Tamper detection BibRef

Phan, R.C.W.[Raphael C.W.],
Tampering with a watermarking-based image authentication scheme,
PR(41), No. 11, November 2008, pp. 3493-3496.
WWW Link. 0808
Encoding; Watermarking; Information hiding; Digital rights management; Image authentication; Watermarking; Tampering; Ownership BibRef

Lee, T.Y.[Tien-You], Lin, S.D.[Shinfeng D.],
Dual watermark for image tamper detection and recovery,
PR(41), No. 11, November 2008, pp. 3497-3506.
WWW Link. 0808
Dual watermark; Tamper recovery; Second chance; Partner-block BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
Using noise inconsistencies for blind image forensics,
IVC(27), No. 10, 2 September 2009, pp. 1497-1503.
Elsevier DOI 0906
Image forensics; Digital forgery; Image tampering; Image segmentation; Noise inconsistency BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
A bibliography on blind methods for identifying image forgery,
SP:IC(25), No. 6, July 2010, pp. 389-399.
Elsevier DOI 1007
Survey, Image Forensics. Survey, Forgery Detecion. Image forensics; Digital forgery; Image tampering; Blind forgery detection; Multimedia security BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
A cyclostationarity analysis applied to image forensics,
WACV09(1-6).
IEEE DOI 0912
BibRef

Lin, Z.C.[Zhou-Chen], He, J.F.[Jun-Feng], Tang, X.[Xiaoou], Tang, C.K.[Chi-Keung],
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis,
PR(42), No. 11, November 2009, pp. 2492-2501.
Elsevier DOI 0907
Pattern analysis; Tampered image detection; JPEG; DCT coefficient; Double quantization BibRef

He, J.F.[Jun-Feng], Lin, Z.C.[Zhou-Chen], Wang, L.F.[Li-Feng], Tang, X.[Xiaoou],
Detecting Doctored JPEG Images Via DCT Coefficient Analysis,
ECCV06(III: 423-435).
Springer DOI 0608
BibRef

Lin, Z.C.[Zhou-Chen], Wang, R.R.[Rong-Rong], Tang, X.[Xiaoou], Shum, H.Y.[Heung-Yeung],
Detecting Doctored Images Using Camera Response Normality and Consistency,
CVPR05(I: 1087-1092).
IEEE DOI 0507
BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing],
A quantization-based semi-fragile watermarking scheme for image content authentication,
JVCIR(22), No. 2, February 2011, pp. 187-200.
Elsevier DOI 1102
Authentication measures; Error map; Quantization; Semi-fragile watermarking; Wavelet transform; Tampered error pixels; Tampering detection sensitivity; Localization capability BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing],
A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization,
JVCIR(30), No. 1, 2015, pp. 312-327.
Elsevier DOI 1507
Adaptive quantization BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing], Chang, R.[Ran],
Image authentication and tamper detection using two complementary watermarks,
ICIP09(4257-4260).
IEEE DOI 0911
BibRef

Chuang, J.C.[Jun-Chou], Hu, Y.C.[Yu-Chen],
An adaptive image authentication scheme for vector quantization compressed image,
JVCIR(22), No. 5, July 2011, pp. 440-449.
Elsevier DOI 1106
Tamper detection; Image authentication; Watermark; Image compression; Vector quantization; Index table; Random values; Random seed BibRef

Kim, K.S.[Kyung-Su], Lee, M.J.[Min-Jeong], Lee, J.W.[Ji-Won], Oh, T.W.[Tae-Woo], Lee, H.Y.[Hae-Yeoun],
Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging,
CVIU(115), No. 9, September 2011, pp. 1308-1323.
Elsevier DOI 1107
Content authentication; Homogeneity analysis; Quad-tree decomposition; Tampering detection; Tampering recovery BibRef

Oh, T.W.[Tae-Woo], Kim, K.S.[Kyung-Su], Lee, H.Y.[Hae-Yeon], Lee, J.W.[Ji-Won], Lee, H.K.[Heung-Kyu],
Enhancing perceptual quality of watermarked high-definition video through composite mask,
IPTA10(161-165).
IEEE DOI 1007
BibRef

Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
Improved watermark detection robust to camcorder capture based on quadrangle estimation,
ICIP09(101-104).
IEEE DOI 0911
BibRef

Kim, H.D.[Hee-Dong], Oh, T.W.[Tae-Woo], Lee, J.W.[Ji-Won], Lee, H.K.[Heung-Kyu],
A hybrid watermarking scheme for CCL-applied video contents,
EUVIP11(199-204).
IEEE DOI 1110
BibRef

Oh, T.W.[Tae-Woo], Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Yoon, Y.S.[Young-Suk], Lee, H.K.[Heung-Kyu],
Spatial self-synchronizing video watermarking technique,
ICIP09(4233-4236).
IEEE DOI 0911
BibRef

Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Lee, H.Y.[Hae-Yeoun], Oh, T.W.[Tae-Woo], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
Robust watermark detection against D-A/A-D conversion for digital cinema using local auto-correlation function,
ICIP08(425-428).
IEEE DOI 0810
BibRef

Kim, K.S.[Kyung-Su], Im, D.H.[Dong-Hyuck], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack,
DW07(323-334).
Springer DOI 0712
BibRef

He, Z.W.[Zhong-Wei], Sun, W.[Wei], Lu, W.[Wei], Lu, H.T.[Hong-Tao],
Digital image splicing detection based on approximate run length,
PRL(32), No. 12, 1 September 2011, pp. 1591-1597.
Elsevier DOI 1108
Image splicing detection; Digital image forensics; Approximate run length; Edge detection; Characteristic function BibRef

Zhang, Q.B.[Qing-Bo], Lu, W.[Wei], Weng, J.[Jian],
Joint image splicing detection in DCT and Contourlet transform domain,
JVCIR(40, Part B), No. 1, 2016, pp. 449-458.
Elsevier DOI 1610
Image splicing detection BibRef

He, Z.W.[Zhong-Wei], Lu, W.[Wei], Sun, W.[Wei],
Improved Run Length Based Detection of Digital Image Splicing,
IWDW11(349-360).
Springer DOI 1208
BibRef

He, Z.W.[Zhong-Wei], Lu, W.[Wei], Sun, W.[Wei], Huang, J.W.[Ji-Wu],
Digital image splicing detection based on Markov features in DCT and DWT domain,
PR(45), No. 12, December 2012, pp. 4292-4299.
Elsevier DOI 1208
Image splicing detection; Digital image forensics; Discrete cosine transform; Discrete wavelet transform; Markov; SVM-RFE BibRef

Feng, X., Cox, I.J., Doerr, G.,
Normalized Energy Density-Based Forensic Detection of Resampled Images,
MultMed(14), No. 3, 2012, pp. 536-545.
IEEE DOI 1202
BibRef

Faridul, H.S.[Hasan Sheikh], Doerr, G.[Gwenael],
Outlier aggregation to pick up scattered watermark energy,
ICIP15(2485-2489)
IEEE DOI 1511
Cross-correlation BibRef

Lee, J.W.[Ji-Won], Lee, M.J.[Min-Jeong], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Screenshot identification by analysis of directional inequality of interlaced video,
JIVP(2012), No. 1 2012, pp. xx-yy.
DOI Link 1202
BibRef

Wang, X.F.[Xiao-Feng], Xue, J.R.[Jian-Ru], Zheng, Z.Q.[Zhen-Qiang], Liu, Z.L.[Zhen-Li], Li, N.[Ning],
Image forensic signature for content authenticity analysis,
JVCIR(23), No. 5, July 2012, pp. 782-797.
Elsevier DOI 1205
Forensic signature; Robust image hash; Content authenticity analysis; Geometric transform estimation; Tampering detection; Tampering localization; Adaptive Harris corner detection; Fisher criterion BibRef

Wang, S.[Shen], Niu, X.[Xiamu],
A Countermeasure against Double Compression Based Image Forensic,
IEICE(E95-D), No. 10, October 2012, pp. 2577-2580.
WWW Link. 1210
BibRef

Barni, M., Costanzo, A.,
A fuzzy approach to deal with uncertainty in image forensics,
SP:IC(27), No. 9, October 2012, pp. 998-1010.
Elsevier DOI 1210
Image forensics; Tampering detection; Fuzzy logic; Data fusion BibRef

Sencar, H.T.[Husrev Taha], Memon, N.[Nasir], (Eds.)
Digital Image Forensics: There is More to a Picture than Meets the Eye,
Springer2013 ISBN 978-1-4614-0756-0


WWW Link. 1211
BibRef

Memon, N.[Nasir],
Photo Forensics: There Is More to a Picture than Meets the Eye,
IWDW11(2).
Springer DOI 1208
BibRef
And: AVSBS11(3).
IEEE DOI 1111
Keynote, summary of ideas. BibRef

Tong, X.J.[Xiao-Jun], Liu, Y.[Yang], Zhang, M.[Miao], Chen, Y.[Yue],
A novel chaos-based fragile watermarking for image tampering detection and self-recovery,
SP:IC(28), No. 3, March 2013, pp. 301-308.
Elsevier DOI 1303
Chaos; Image security; Fragile watermarking; Tampering localization; Self-recovery BibRef

Singh, D.[Durgesh], Shivani, S.[Shivendra], Agarwal, S.[Suneeta],
Quantization-Based Fragile Watermarking Using Block-Wise Authentication and Pixel-Wise Recovery Scheme for Tampered Image,
IJIG(13), No. 2, April 2013, pp. 1340002.
DOI Link 1308
BibRef
Earlier: A2, A1, A3:
DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme,
IbPRIA13(640-647).
Springer DOI 1307
BibRef

Chen, C.L.[Cheng-Long], Ni, J.Q.[Jiang-Qun], Huang, J.W.[Ji-Wu],
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach,
IP(22), No. 12, 2013, pp. 4699-4710.
IEEE DOI 1312
BibRef
Earlier: A1, A2, Only:
Median Filtering Detection Using Edge Based Prediction Matrix,
IWDW11(361-375).
Springer DOI 1208
image coding BibRef

Tokuda, E.[Eric], Pedrini, H.[Helio], Rocha, A.[Anderson],
Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach,
JVCIR(24), No. 8, 2013, pp. 1276-1292.
Elsevier DOI 1312
Digital forensics BibRef

Ryu, S.J.[Seung-Jin], Lee, H.K.[Heung-Kyu],
Estimation of linear transformation by analyzing the periodicity of interpolation,
PRL(36), No. 1, 2014, pp. 89-99.
Elsevier DOI 1312
Image forensics BibRef

Kannammal, A., Rani, S.S.[S. Subha],
Two level security for medical images using watermarking/encryption algorithms,
IJIST(24), No. 1, 2014, pp. 111-120.
DOI Link 1403
digital imaging and communications in medicine BibRef

Ryu, S.J.[Seung-Jin], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Detecting Trace of Seam Carving for Forensic Analysis,
IEICE(E97-D), No. 5, May 2014, pp. 1304-1311.
WWW Link. 1405
BibRef

Yang, B.[Ben_Juan], Liu, B.[Ben_Yong],
Feature Fusion for Blurring Detection in Image Forensics,
IEICE(E97-D), No. 6, June 2014, pp. 1690-1693.
WWW Link. 1407
BibRef

Chang, T.Y.[Tang-You], Tai, S.C.[Shen-Chuan], Lin, G.S.[Guo-Shiang],
A passive multi-purpose scheme based on periodicity analysis of CFA artifacts for image forensics,
JVCIR(25), No. 6, 2014, pp. 1289-1298.
Elsevier DOI 1407
Image forensics BibRef

Lyu, S.W.[Si-Wei], Pan, X.[Xunyu], Zhang, X.[Xing],
Exposing Region Splicing Forgeries with Blind Local Noise Estimation,
IJCV(110), No. 1, November 2014, pp. 202-221.
WWW Link. 1411
BibRef
Earlier: A2, A3, A1:
Exposing image splicing with inconsistent local noise variances,
ICCP12(1-10).
IEEE DOI 1208
BibRef

Vellaisamy, S., Ramesh, V.,
Inversion attack resilient zero-watermarking scheme for medical image authentication,
IET-IPR(8), No. 12, 2014, pp. 718-727.
DOI Link 1412
image watermarking BibRef

Bian, S., Luo, W., Huang, J.,
Exposing Fake Bit Rate Videos and Estimating Original Bit Rates,
CirSysVideo(24), No. 12, December 2014, pp. 2144-2154.
IEEE DOI 1412
Feature extraction BibRef

De Rosa, A., Fontani, M., Massai, M., Piva, A., Barni, M.,
Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics,
SPLetters(22), No. 8, August 2015, pp. 1132-1136.
IEEE DOI 1502
digital forensics BibRef

Chu, X., Stamm, M.C.[Matthew C.], Chen, Y., Liu, K.J.R.[K. J. Ray],
On Antiforensic Concealability With Rate-Distortion Tradeoff,
IP(24), No. 3, March 2015, pp. 1087-1100.
IEEE DOI 1502
Detectors BibRef

Stamm, M.C.[Matthew C.], Tjoa, S.K.[Steven K.], Lin, W.S.[W. Sabrina], Liu, K.J.R.[K. J. Ray],
Undetectable image tampering through JPEG compression anti-forensics,
ICIP10(2109-2112).
IEEE DOI 1009
BibRef

Zhao, X., Wang, S., Li, S., Li, J.,
Passive Image-Splicing Detection by a 2-D Noncausal Markov Model,
CirSysVideo(25), No. 2, February 2015, pp. 185-199.
IEEE DOI 1502
Analytical models BibRef

Yoshida, M.[Maki], Ohkita, K.[Kazuya], Fujiwara, T.[Toru],
Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking,
IEICE(E98-D), No. 1, January 2015, pp. 58-64.
WWW Link. 1503
BibRef

Ohkita, K.[Kazuya], Yoshida, M.[Maki], Kitamura, I.[Itaru], Fujiwara, T.[Toru],
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking,
DW09(279-293).
Springer DOI 0908
BibRef

Lee, S.W.[Sang-Wook], Song, J.E.[Ji Eun], Lee, W.Y.[Wan Yeon], Ko, Y.W.[Young Woong], Lee, H.[Heejo],
Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations,
IEICE(E98-D), No. 1, January 2015, pp. 95-97.
WWW Link. 1503
BibRef

Eswaraiah, R., Reddy, E.S.[E. Sreenivasa],
Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest,
IET-IPR(9), No. 8, 2015, pp. 615-625.
DOI Link 1506
Internet BibRef

Khan, Z.[Zohaib], Shafait, F.[Faisal], Mian, A.[Ajmal],
Automatic ink mismatch detection for forensic document analysis,
PR(48), No. 11, 2015, pp. 3615-3626.
Elsevier DOI 1506
BibRef
Earlier:
Hyperspectral Document Imaging: Challenges and Perspectives,
CBDAR13(150-163).
Springer DOI 1404
BibRef
Earlier:
Hyperspectral Imaging for Ink Mismatch Detection,
ICDAR13(877-881)
IEEE DOI 1312
Hyperspectral imaging. document image processing BibRef

Luo, Z.[Zhipei], Shafait, F.[Faisal], Mian, A.[Ajmal],
Localized forgery detection in hyperspectral document images,
ICDAR15(496-500)
IEEE DOI 1511
BibRef

Khan, Z.[Zohaib], Shafait, F.[Faisal], Mian, A.[Ajmal],
Joint Group Sparse PCA for Compressed Hyperspectral Imaging,
IP(24), No. 12, December 2015, pp. 4934-4942.
IEEE DOI 1512
compressed sensing BibRef

Hou, J.[Jun], Cheng, Y.[Yan],
Expose Spliced Photographic Basing on Boundary and Noise Features,
IEICE(E98-D), No. 7, July 2015, pp. 1426-1429.
WWW Link. 1508
BibRef

Chen, J.S.[Jian-Sheng], Kang, X.G.[Xian-Gui], Liu, Y.[Ye], Wang, Z.J.,
Median Filtering Forensics Based on Convolutional Neural Networks,
SPLetters(22), No. 11, November 2015, pp. 1849-1853.
IEEE DOI 1509
digital forensics BibRef

Botta, M.[Marco], Cavagnino, D.[Davide], Pomponiu, V.[Victor],
Optimization techniques to transform fragile watermarking,
SPIE(Newsroom), July 11, 2015
DOI Link 1511
An algorithm alters image pixels to enable insertion of a watermark into the coefficients of a transformed domain, without the need for inverse transformation. BibRef

Carvalho, T.[Tiago],
Illumination Inconsistency Sleuthing for Exposing Fauxtography and Uncovering Composition Telltales in Digital Images,
ELCVIA(14), No. 3, 2015, pp. xx-yy.
DOI Link 1601
Thesis summary. Is the image real or composed. BibRef

Mittal, A., Saad, M.A., Bovik, A.C.,
A Completely Blind Video Integrity Oracle,
IP(25), No. 1, January 2016, pp. 289-300.
IEEE DOI 1601
Databases BibRef

Korus, P., Huang, J.,
Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk,
SPLetters(23), No. 1, January 2016, pp. 169-173.
IEEE DOI 1601
Detectors BibRef

Korus, P., Huang, J.,
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images,
IP(25), No. 3, March 2016, pp. 1312-1326.
IEEE DOI 1602
Authentication BibRef

He, P.S.[Pei-Song], Jiang, X.[Xinghao], Sun, T.[Tanfeng], Wang, S.L.[Shi-Lin],
Double compression detection based on local motion vector field analysis in static-background videos,
JVCIR(35), No. 1, 2016, pp. 55-66.
Elsevier DOI 1602
Video forensics BibRef

Taimori, A.[Ali], Razzazi, F.[Farbod], Behrad, A.[Alireza], Ahmadi, A.[Ali], Babaie-Zadeh, M.[Massoud],
Quantization-Unaware Double JPEG Compression Detection,
JMIV(54), No. 3, March 2016, pp. 269-286.
Springer DOI 1604
BibRef

Bestagini, P., Milani, S., Tagliasacchi, M., Tubaro, S.,
Codec and GOP Identification in Double Compressed Videos,
IP(25), No. 5, May 2016, pp. 2298-2310.
IEEE DOI 1604
What was used to code the video first. Codecs. group of pictures. BibRef

Yang, J.Q.[Jian-Quan], Zhu, G.P.[Guo-Pu], Shi, Y.Q.[Yun Qing],
Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity,
IP(25), No. 6, June 2016, pp. 2647-2656.
IEEE DOI 1605
Discrete cosine transforms BibRef

Yang, J.Q.[Jian-Quan], Zhu, G.P.[Guo-Pu], Wang, J.L.[Jun-Long], Shi, Y.Q.[Yun Qing],
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration,
IWDW13(169-179).
Springer DOI 1407
BibRef

Pasquini, C.[Cecilia],
Statistical and deterministic approaches for multimedia forensics,
ELCVIA(15), No. 2, 2016, pp. 16-18.
DOI Link 1611
BibRef

Iuliani, M.[Massimo], Fanfani, M.[Marco], Colombo, C.[Carlo], Piva, A.[Alessandro],
Reliability assessment of principal point estimates for forensic applications,
JVCIR(42), No. 1, 2017, pp. 65-77.
Elsevier DOI 1701
camera principal point. Image Forensics BibRef

Liu, Q.Z.[Qing-Zhong],
An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics,
PR(65), No. 1, 2017, pp. 35-46.
Elsevier DOI 1702
BibRef
Earlier:
Exposing seam carving forgery under recompression attacks by hybrid large feature mining,
ICPR16(1041-1046)
IEEE DOI 1705
Discrete cosine transforms, Feature extraction, Forgery, Image coding, Image forensics, Medical services, Transform coding, big feature mining, image forgery, recompression, seam carving. BibRef

Jin, Z.W.[Zhi-Wei], Cao, J.[Juan], Zhang, Y.D.[Yong-Dong], Zhou, J.[Jianshe], Tian, Q.[Qi],
Novel Visual and Statistical Image Features for Microblogs News Verification,
MultMed(19), No. 3, March 2017, pp. 598-608.
IEEE DOI 1702
Validation, true or not, of news posts analyzing the images used in addition to text. BibRef

Shen, X.J.[Xuan-Jing], Shi, Z.[Zenan], Chen, H.P.[Hai-Peng],
Splicing image forgery detection using textural features based on the grey level co-occurrence matrices,
IET-IPR(11), No. 1, January 2017, pp. 44-53.
DOI Link 1703
BibRef

Wo, Y.[Yan], Yang, K.[Kemin], Han, G.[Guoqiang], Chen, H.[Haichao], Wu, W.[Wenbo],
Copy-move forgery detection based on multi-radius PCET,
IET-IPR(11), No. 2, February 2017, pp. 99-108.
DOI Link 1703
BibRef

Chen, C., Ni, J., Shen, Z., Shi, Y.Q.,
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications,
IP(26), No. 6, June 2017, pp. 2811-2824.
IEEE DOI 1705
frequency-domain analysis, image forensics, image sampling, blind forensics, characteristic resampling peaks, digital images, frequency domain, image authentication, image forgery detection, image geometric transformation, image security, periodic artifacts, repeated resizing, repeated rotation, resizing-rotation, second-order statistics, spectral method, successive geometric transformation, undergone single-geometric transformation, Digital images, Forensics, Forgery, Image coding, Image reconstruction, Interpolation, Transform coding, Digital image forensics, geometric transformations, image forgery detection, interpolation detection, resampling, detection BibRef

Hou, J.U., Lee, H.K.,
Detection of Hue Modification Using Photo Response Nonuniformity,
CirSysVideo(27), No. 8, August 2017, pp. 1826-1832.
IEEE DOI 1708
Algorithm design and analysis, Correlation, Digital images, Estimation, Forensics, Forgery, Image color analysis, Color filter array (CFA), digital image forensics, hue, photo response nonuniformity (PRNU), sensor, pattern, noise BibRef

He, P.S.[Pei-Song], Jiang, X.[Xinghao], Sun, T.[Tanfeng], Wang, S.L.[Shi-Lin], Li, B.[Bin], Dong, Y.[Yi],
Frame-wise detection of relocated I-frames in double compressed H.264 videos based on convolutional neural network,
JVCIR(48), No. 1, 2017, pp. 149-158.
Elsevier DOI 1708
Double compression detection BibRef

Zhang, D.Y.[Deng-Yong], Yin, T.[Ting], Yang, G.B.[Gao-Bo], Xia, M.[Ming], Li, L.[Leida], Sun, X.M.[Xing-Ming],
Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies,
JVCIR(48), No. 1, 2017, pp. 281-291.
Elsevier DOI 1708
Image forensics BibRef

Su, Y.[Yuting], Jin, X.[Xiao], Zhang, C.Q.[Cheng-Qian], Chen, Y.[Yawei],
Hierarchical image resampling detection based on blind deconvolution,
JVCIR(48), No. 1, 2017, pp. 480-490.
Elsevier DOI 1708
Image forensics BibRef

Chen, Z.P.[Zhi-Peng], Zhao, Y.[Yao], Ni, R.R.[Rong-Rong],
Detection of operation chain: JPEG-Resampling-JPEG,
SP:IC(57), No. 1, 2017, pp. 8-20.
Elsevier DOI 1709
Digital forensics BibRef

Xue, F.[Fei], Ye, Z.[Ziyi], Lu, W.[Wei], Liu, H.M.[Hong-Mei], Li, B.[Bin],
MSE period based estimation of first quantization step in double compressed JPEG images,
SP:IC(57), No. 1, 2017, pp. 76-83.
Elsevier DOI 1709
Image forensics BibRef


Chen, C., McCloskey, S.[Scott], Yu, J.,
Image Splicing Detection via Camera Response Function Analysis,
CVPR17(1876-1885)
IEEE DOI 1711
Cameras, Forgery, Image edge detection, Nonlinear optics, Optical imaging, Splicing, Tools BibRef

Bondi, L., Lameri, S., Güera, D., Bestagini, P., Delp, E.J., Tubaro, S.,
Tampering Detection and Localization Through Clustering of Camera-Based CNN Features,
MedForen17(1855-1864)
IEEE DOI 1709
Cameras, Feature extraction, Forgery, Image coding, Neurons, Transform, coding BibRef

Amerini, I., Uricchio, T., Ballan, L., Caldelli, R.,
Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks,
MedForen17(1865-1871)
IEEE DOI 1709
Discrete cosine transforms, Frequency-domain analysis, Histograms, Image coding, Q-factor, Training, Transform, coding BibRef

Chen, B.C., Ghosh, P., Morariu, V.I., Davis, L.S.,
Detection of Metadata Tampering Through Discrepancy Between Image Content and Metadata Using Multi-task Deep Learning,
MedForen17(1872-1880)
IEEE DOI 1709
Cameras, Humidity, Metadata, Predictive models, Sun, Training BibRef

Bolles, R., Burns, J.B., Graciarena, M., Kathol, A., Lawson, A., McLaren, M., Mensink, T.,
Spotting Audio-Visual Inconsistencies (SAVI) in Manipulated Video,
MedForen17(1907-1914)
IEEE DOI 1709
Acoustics, Face, Feature extraction, Lips, Semantics, Speech, Visualization BibRef

Xu, Q.Y.[Qian-Yi], Sun, T.F.[Tan-Feng], Jiang, X.H.[Xing-Hao], Dong, Y.[Yi],
HEVC Double Compression Detection Based on SN-PUPM Feature,
IWDW17(3-17).
Springer DOI 1708
BibRef

Asaad, A.[Aras], Jassim, S.[Sabah],
Topological Data Analysis for Image Tampering Detection,
IWDW17(136-146).
Springer DOI 1708
BibRef

Choi, H.Y., Jang, H.U., Kim, D., Son, J., Mun, S.M., Choi, S., Lee, H.K.,
Detecting composite image manipulation based on deep neural networks,
WSSIP17(1-5)
IEEE DOI 1707
Computer architecture, Convolution, Feature extraction, Forensics, Machine learning, Training, Composite manipulation detection, Convolutional neural networks, Deep learning, Multimedia, forensics BibRef

Yu, J.J.[Jing-Jing], Zhan, Y.F.[Yi-Feng], Yang, J.H.[Jian-Hua], Kang, X.G.[Xian-Gui],
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks,
IWDW16(3-15).
Springer DOI 1703
BibRef

Ye, J.Y.[Jing-Yu], Shi, Y.Q.[Yun-Qing],
A Hybrid Feature Model for Seam Carving Detection,
IWDW17(77-89).
Springer DOI 1708
BibRef
Earlier:
A Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection,
IWDW16(172-184).
Springer DOI 1703
BibRef

He, X.[Xin], Guan, Q.[Qingxiao], Tong, Y.F.[Yan-Fei], Zhao, X.F.[Xian-Feng], Yu, H.B.[Hai-Bo],
A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation,
IWDW16(145-158).
Springer DOI 1703
BibRef

Le Philippe, N.[Noe], Puech, W.[William], Fiorio, C.[Christophe],
Phylogeny of JPEG images by ancestor estimation using missing markers on image pairs,
IPTA16(1-6)
IEEE DOI 1703
data compression BibRef

Ho, A.T.P., Wang, K., Cayre, F.,
An effective histogram-based approach to JPEG-100 forensics,
IPTA16(1-6)
IEEE DOI 1703
Gaussian distribution BibRef

Felsky, J.F.[Jean Felipe], Justino, E.J.R.[Edson J. R.], Facon, J.[Jacques],
Forensic Analysis of Manuscript Authorship: An Optimized Computational Approach Based on Texture Descriptors,
SSSPR16(357-367).
Springer DOI 1611
BibRef

Serizel, R., Bisot, V., Essid, S., Richard, G.,
Machine listening techniques as a complement to video image analysis in forensics,
ICIP16(948-952)
IEEE DOI 1610
Acoustics BibRef

Purohit, K., Rajagopalan, A.N.,
Splicing localization in motion blurred 3D scenes,
ICIP16(3922-3926)
IEEE DOI 1610
Cameras BibRef

Rana, A., Valenzise, G., DuFaux, F.[Frédéric],
An evaluation of HDR image matching under extreme illumination changes,
VCIP16(1-4)
IEEE DOI 1701
Detectors BibRef

Fan, W., Valenzise, G., Banterle, F., DuFaux, F.[Frédéric],
Forensic detection of inverse tone mapping in HDR images,
ICIP16(166-170)
IEEE DOI 1610
Dynamic range BibRef

Hagui, M., Boukhris, A., Mahjoub, M.A.,
Comparative Study and Enhancement of Camera Tampering Detection Algorithms,
CGiV16(226-231)
IEEE DOI 1608
computer vision BibRef

Kuznetsov, A.[Andrey],
Remote Sensing Data Copy-Move Forgery Protection Algorithm,
ICCVG16(544-552).
Springer DOI 1611
BibRef

Kuznetsov, A.[Andrey], Myasnikov, V.[Vladislav],
A Copy-Move Detection Algorithm Using Binary Gradient Contours,
ICIAR16(349-357).
Springer DOI 1608
BibRef

Alfraih, A.S.[Areej S.], Briffa, J.A.[Johann A.], Wesemeyer, S.[Stephan],
Cloning Localization Based on Feature Extraction and K-means Clustering,
IWDW14(410-419).
Springer DOI 1602
BibRef

Barni, M.[Mauro], Fontani, M.[Marco], Tondi, B.[Benedetta],
Universal Counterforensics of Multiple Compressed JPEG Images,
IWDW14(31-46).
Springer DOI 1602
BibRef

Kao, D.Y.[Da-Yu], Chiu, Y.H.[Ying-Hsuan],
An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics,
IWDW14(498-512).
Springer DOI 1602
BibRef

Lu, J.F.[Jian-Feng], Huang, Q.[Qianru], Wang, M.[Meng], Li, L.[Li], Dai, J.P.[Jun-Ping], Chang, C.C.[Chin-Chen],
Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack,
IWDW14(187-198).
Springer DOI 1602
BibRef

Xu, G.S.[Guan-Shuo], Ye, J.Y.[Jing-Yu], Shi, Y.Q.[Yun-Qing],
New Developments in Image Tampering Detection,
IWDW14(3-17).
Springer DOI 1602
BibRef

Fan, Y.[Yu], Carre, P.[Philippe], Fernandez-Maloigne, C.[Christine],
Image splicing detection with local illumination estimation,
ICIP15(2940-2944)
IEEE DOI 1511
Image splicing; generalized grey-word algorithms; illuminant color BibRef

Peng, A.[Anjie], Zeng, H.[Hui], Lin, X.D.[Xiao-Dan], Kang, X.G.[Xian-Gui],
Countering anti-forensics of image resampling,
ICIP15(3595-3599)
IEEE DOI 1511
anti-forensics; partial autocorrelation; resampling BibRef

Zolotavkin, Y., Juhola, M.,
Quantization Based Watermarking Approach with Gain Attack Recovery,
DICTA14(1-8)
IEEE DOI 1502
AWGN BibRef

Valenzise, G., Tagliasacchi, M., Tubaro, S.,
Detectability-quality trade-off in JPEG counter-forensics,
ICIP14(5337-5341)
IEEE DOI 1502
Accuracy BibRef

Cozzolino, D.[Davide], Gragnaniello, D.[Diego], Verdoliva, L.[Luisa],
Image forgery detection through residual-based local descriptors and block-matching,
ICIP14(5297-5301)
IEEE DOI 1502
Conferences BibRef

Cozzolino, D.[Davide], Gragnaniello, D.[Diego], Verdoliva, L.[Luisa],
Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques,
ICIP14(5302-5306)
IEEE DOI 1502
Cameras BibRef

Cozzolino, D.[Davide], Poggi, G.[Giovanni], Verdoliva, L.[Luisa],
Copy-move forgery detection based on PatchMatch,
ICIP14(5312-5316)
IEEE DOI 1502
Boolean functions BibRef

Ravi, H.[Hareesh], Subramanyam, A.V., Gupta, G.[Gaurav], Kumar, B.A.[B. Avinash],
Compression noise based video forgery detection,
ICIP14(5352-5356)
IEEE DOI 1502
Accuracy BibRef

Ferreira, A.[Anselmo], Rocha, A.[Anderson],
A Multiscale and Multi-Perturbation Blind Forensic Technique for Median Detecting,
CIARP14(302-310).
Springer DOI 1411
Detect that median filtering has been applied. BibRef

Lalitha, M., Holalad, H., Rajput, S., Muktanidhi, S.D., Mudenagudi, U.,
A classifier framework for the detection of doctored images,
NCVPRIPG13(1-4)
IEEE DOI 1408
Bayes methods BibRef

Mall, V., Roy, A.K., Mitra, S.K.,
Digital image tampering detection and localization using singular value decomposition technique,
NCVPRIPG13(1-4)
IEEE DOI 1408
cameras BibRef

Ma, P.F.[Peng-Fei], Wang, R.D.[Rang-Ding], Yan, D.Q.[Di-Qun], Jin, C.[Chao],
A Huffman Table Index Based Approach to Detect Double MP3 Compression,
IWDW13(258-271).
Springer DOI 1407
BibRef

Gao, S.[Shang], Zhang, C.[Cong], Wu, C.L.[Chan-Le], Ye, G.[Gang], Huang, L.[Lei],
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image,
IWDW13(303-313).
Springer DOI 1407
BibRef

Shen, C.[Chao], Cai, Z.M.[Zhong-Min], Maxion, R.A.[Roy A.], Guan, X.H.[Xiao-Hong],
On User Interaction Behavior as Evidence for Computer Forensic Analysis,
IWDW13(221-231).
Springer DOI 1407
BibRef

Zhao, X.D.[Xu-Dong], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua], Yuan, Q.Q.[Quan-Qiao],
Image splicing detection based on noncausal Markov model,
ICIP13(4462-4466)
IEEE DOI 1402
Image splicing detection BibRef

Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando], Liste, N.[Noelia],
Quantization lattice estimation for multimedia forensics,
ICIP13(4452-4456)
IEEE DOI 1402
Dual lattice; lattice estimation; multimedia forensics; noisy estimation BibRef

Wu, C.M.[Chao-Ming],
Multi-level tamper detection and recovery with tamper type identification,
ICIP13(4512-4516)
IEEE DOI 1402
adjacent-block based detection BibRef

Conotter, V., Comesana, P., Perez-Gonzalez, F.,
Forensic analysis of full-frame linearly filtered JPEG images,
ICIP13(4517-4521)
IEEE DOI 1402
JPEG compression;linear filtering BibRef

Bian, S.[Shan], Luo, W.[Weiqi], Huang, J.W.[Ji-Wu],
Exposing fake bitrate video and its original bitrate,
ICIP13(4492-4496)
IEEE DOI 1402
Digital Video Forensics; Fake Bitrate Video; Video Bitrate Estimation BibRef

Jain, R.[Rajiv], Doermann, D.S.[David S.],
Localized document image change detection,
ICDAR15(786-790)
IEEE DOI 1511
BibRef
Earlier:
VisualDiff: Document Image Verification and Change Detection,
ICDAR13(40-44)
IEEE DOI 1312
Change Detection; Document Image; OCR; SIFT. document image processing BibRef

Tsesmelis, T.[Theodore], Christensen, L.[Lars], Fihl, P.[Preben], Moeslund, T.B.[Thomas B.],
Tamper detection for active surveillance systems,
AVSS13(57-62)
IEEE DOI 1311
Cameras BibRef

García-Ordás, D.[Diego], Fernández-Robles, L.[Laura], Alegre, E.[Enrique], García-Ordás, M.T.[María Teresa],
Automatic Tampering Detection in Spliced Images with Different Compression Levels,
IbPRIA13(416-423).
Springer DOI 1307
BibRef

Pollard, S.[Stephen], Simske, S.[Steven], Adams, G.[Guy],
Print biometrics: Recovering forensic signatures from halftone images,
ICPR12(1651-1654).
WWW Link. 1302
BibRef

Li, H.D.[Hao-Dong], Luo, W.Q.[Wei-Qi], Huang, J.W.[Ji-Wu],
Countering anti-JPEG compression forensics,
ICIP12(241-244).
IEEE DOI 1302
BibRef

Maity, S.P.[Santi P.], Delpha, C.[Claude],
Optimal watermark power and host samples allocation under random gain attack,
ICIP12(2201-2204).
IEEE DOI 1302
BibRef

Di Crescenzo, G.[Giovanni], Arce, G.[Gonzalo],
Data Forensics Constructions from Cryptographic Hashing and Coding,
IWDW11(494-509).
Springer DOI 1208
BibRef

Vázquez-Padín, D.[David], Pérez-González, F.[Fernando],
Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces,
IWDW11(306-320).
Springer DOI 1208
BibRef

Zhang, R.[Rong], Wang, R.D.[Rang-Ding], Ng, T.T.[Tian-Tsong],
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges,
IWDW11(292-305).
Springer DOI 1208
BibRef

Zhao, X.D.[Xu-Dong], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua], Lin, X.[Xiang],
A Distributed Scheme for Image Splicing Detection,
IWDW13(314-325).
Springer DOI 1407
BibRef
Earlier: A1, A2, A3, A4, Only:
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection,
IWDW11(243-256).
Springer DOI 1208
BibRef
Earlier: A1, A4, A3, A2, Only:
Detecting Digital Image Splicing in Chroma Spaces,
DW10(12-22).
Springer DOI 1010
BibRef

Chen, L.[Luyi], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua],
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection,
IWDW11(376-386).
Springer DOI 1208
BibRef

Zhou, L.N.[Lin-Na], Guo, Y.B.[Yun-Biao], You, X.G.[Xin-Gang],
Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor,
IWDW11(257-267).
Springer DOI 1208
BibRef

Bateman, P.J.[Philip J.], Ho, A.T.S.[Anthony T. S.], Briffa, J.A.[Johann A.],
Image Forensics of High Dynamic Range Imaging,
IWDW11(336-348).
Springer DOI 1208
BibRef

Kwok, C.W.[Chun-Wing], Au, O.C., Chui, S.H.[Sung-Him],
Alternative Anti-Forensics Method for Contrast Enhancement,
IWDW11(398-410).
Springer DOI 1208
BibRef

Chen, L.[Licong], Shi, Y.Q.[Yun Q.], Sutthiwan, P.[Patchara], Niu, X.X.[Xin-Xin],
Non-uniform Quantization in Breaking HUGO,
IWDW13(48-62).
Springer DOI 1407
BibRef

Sutthiwan, P.[Patchara], Shi, Y.Q.[Yun Q.],
Anti-Forensics of Double JPEG Compression Detection,
IWDW11(411-424).
Springer DOI 1208
BibRef

Liu, H.M.[Hong-Mei], Li, L.[Lei], Li, J.[Jian], Huang, J.W.[Ji-Wu],
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates,
IWDW11(167-180).
Springer DOI 1208
BibRef

Nguyen, H.C.[Hieu Cuong], Katzenbeisser, S.[Stefan],
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images,
IWDW11(387-397).
Springer DOI 1208
BibRef

Jung, D.J.[Dae-Jin], Hyun, D.K.[Dai-Kyung], Ryu, S.J.[Seung-Jin], Lee, J.W.[Ji-Won], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity,
IWDW11(281-291).
Springer DOI 1208
BibRef

Wu, R.[Ruoyu], Li, X.L.[Xiao-Long], Yang, B.[Bin],
Identifying computer generated graphics via histogram features,
ICIP11(1933-1936).
IEEE DOI 1201
BibRef

Ananya, U, Mudenagudi, U.[Uma],
Detection of doctored images using bispectral analysis,
ICIIP11(1-6).
IEEE DOI 1112
BibRef

Zhu, S.Y.[Shu-Yi], Cao, X.C.[Xiao-Chun], Zhao, H.D.[Han-Dong],
Photographic Composite Detection Using Two Circles,
ICIG11(858-863).
IEEE DOI 1109
BibRef

Dong, L.[Lisha], Kong, X.W.[Xiang-Wei], Wang, B.[Bo], You, X.[Xin'gang],
Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients,
ICIG11(234-237).
IEEE DOI 1109
BibRef

Li, L.[Lu], Xue, J.R.[Jian-Ru], Wang, X.F.[Xiao-Feng], Tian, L.[Lihua],
A Robust Approach to Detect Tampering by Exploring Correlation Patterns,
CAIP11(II: 515-522).
Springer DOI 1109
BibRef

Zhao, Y.Q.[Yu Qian], Shih, F.Y.[Frank Y.], Shi, Y.Q.[Yun Q.],
Passive Detection of Paint-Doctored JPEG Images,
DW10(1-11).
Springer DOI 1010
BibRef

Cao, H.[Hong], Kot, A.C.[Alex C.],
Detection of Tampering Inconsistencies on Mobile Photos,
DW10(105-119).
Springer DOI 1010
BibRef

Wang, W.[Wei], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise,
DW10(120-133).
Springer DOI 1010
BibRef

Serra-Ruiz, J., Megias, D.,
DWT and TSVQ-based Semi-fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images,
PSIVT10(331-336).
IEEE DOI 1011
BibRef

Goodwin, J.[Julian], Chetty, G.[Girija],
Blind Video Tamper Detection Based on Fusion of Source Features,
DICTA11(608-613).
IEEE DOI 1205
BibRef

Chetty, G.[Girija], Goodwin, J.[Julian], Singh, M.[Monica],
Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features,
ACIVS10(II: 79-87).
Springer DOI 1012
BibRef

Wang, W.[Wei], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Image tampering detection based on stationary distribution of Markov chain,
ICIP10(2101-2104).
IEEE DOI 1009
BibRef

Ardizzone, E.[Edoardo], Bruno, A.[Alessandro], Mazzola, G.[Giuseppe],
Detecting multiple copies in tampered images,
ICIP10(2117-2120).
IEEE DOI 1009
See also Visual Saliency by Keypoints Distribution Analysis. BibRef

Yao, X.Z.[Xin-Zhi], Liu, H.M.[Hong-Mei], Rui, W.[Wei], Huang, J.W.[Ji-Wu],
Content-based authentication algorithm for binary images,
ICIP09(2893-2896).
IEEE DOI 0911
Tamper detection BibRef

Sutcu, Y., Coskun, B., Sencar, H.T., Memon, N.,
Tamper Detection Based on Regularity of Wavelet Transform Coefficients,
ICIP07(I: 397-400).
IEEE DOI 0709
BibRef

Gou, H.M.[Hong-Mei], Swaminathan, A.[Ashwin], Wu, M.[Min],
Noise Features for Image Tampering Detection and Steganalysis,
ICIP07(VI: 97-100).
IEEE DOI 0709
BibRef

Kihara, M.[Mirei], Fujiyoshi, M.[Masaaki], Wan, Q.T.[Qing Tao], Kiya, H.[Hitoshi],
Image Tamper Detection using Mathematical Morphology,
ICIP07(VI: 101-104).
IEEE DOI 0709
BibRef

Roy, S.[Sujoy], Sun, Q.[Qibin],
Robust Hash for Detecting and Localizing Image Tampering,
ICIP07(VI: 117-120).
IEEE DOI 0709
BibRef

Swaminathan, A., Wu, M.[Min], Liu, K.J.R.,
Image Tampering Identification using Blind Deconvolution,
ICIP06(2309-2312).
IEEE DOI 0610
BibRef

Wu, Y.D.[Yong-Dong],
Tamper-Localization Watermarking with Systematic Error Correcting Code,
ICIP06(1965-1968).
IEEE DOI 0610
BibRef

Liu, Y., Boncelet, C.G.[Charles G.],
The Crc-Ntmac for Image Tamper Proofing and Authentication,
ICIP06(1985-1988).
IEEE DOI 0610
BibRef

Boncelet, C.G.,
Image Authentication and Tamperproofing for Noisy Channels,
ICIP05(I: 677-680).
IEEE DOI 0512
BibRef

Watanabe, J.[Jun], Hasegawa, M., Kato, S.,
A study on a watermarking method for both copyright protection and tamper detection,
ICIP04(IV: 2155-2158).
IEEE DOI 0505
BibRef

Wu, J.H.[Jin-Hai], Zhu, B.B., Li, S.P.[Shi-Peng], Lin, F.[Fuzong],
A secure image authentication algorithm with pixel-level tamper localization,
ICIP04(III: 1573-1576).
IEEE DOI 0505
BibRef

Inoue, H.,
Wavelet-based Watermarking for Tamper Proofing of Still Images,
ICIP00(Vol II: 88-91).
IEEE DOI 0008
BibRef

Fridrich, J.,
Image watermarking for tamper detection,
ICIP98(II: 404-408).
IEEE DOI 9810
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Source Camera Identification, Camera Fingerprint .


Last update:Nov 18, 2017 at 20:56:18