- E. Kee, M.K. Johnson and H. Farid, "Digital image authentication from JPEG headers", IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1066-1075, 2011.
- J. Kornblum, "Using JPEG quantization tables to identify imagery processed by software", Digital Investigation, vol. 5, pp. S21–S25, 2008.
- CCITT Recommendation T.81, ISO/IEC 10918-1:1994, "Information technology - Digital compression and coding of continuous-tone still images: Requirements and guidelines ", 1992.
- Z. Lin, J. He, X. Tang, Chi K. Tang "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis", Journal Pattern Recognition, Vol. 42, pp. 2492-2501, 2009.
- Alin C. Popescu and H. Farid, "Statistical tools for digital forensics", Lecture Notes in Computer Science, vol. 3200, pp 128-147, 2005.
- H. Farid, "Exposing digital forgeries from JPEG ghosts", IEEE Transactions on Information Forensics and Security, vol. 4, pp. 154-160, 2009.
- M.C. Stamm and K.J.R. Liu, "Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms", IEEE Transactions on Information Forensics and Security, vol. 5, pp. 492-506, 2010.
- J. Lukas, J. Fridrich and M. Goljan, "Digital Camera Identification from Sensor Noise ", IEEE Transactions on Information Security and Forensics, pp. 205-214, 2006.
- Mo Chen, J. Fridrich and M. Goljan , "Digital Imaging Sensor Identification (Further Study)", Proceedings. of SPIE Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents, pp. 0P-0Q, 2007.
- W. Wang, J. Dong and T. Tan, "Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise", Proceedings of the 9th International Conference on Digital watermarking, pp. 120-133, 2010.
- R. Gonzalez and R. Woods, "Digital Image Processing (3rd ed.)", Prentice Hall, pp. 165–168, 2008.
- M. Kirchner and T. Gloe, "On Resampling Detection in Re-compressed Images". IEEE Workshop on Information Forensics and Security, pp. 21-25, 2009.
Featured Post
Welcome to the Forensic Multimedia Analysis blog (formerly the Forensic Photoshop blog). With the latest developments in the analysis of m...
Thursday, December 26, 2013
Academic sources for authentication of digital images
For folks needing references for their authentication work, here's a short list (in no particular order):
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment