參考文獻 |
[1] M. Chen, J. Fridrich, M. Goljan, and J. Lukáš, “Determining image origin and integrity using sensor noise,” IEEE Transactions on Information Forensics Security, vol. 3, no. 1, pp. 74–90, 2008.
[2] Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Transactions on Information Forensics Security, vol. 3, no.1, pp. 101–117, 2008.
[3] Avcibas, S. Bayram, N. Memon, M. Ramkumar, and B. Sankur, “A classifier design for detecting image manipulations,” IEEE International Conference on Image Processing, vol. 4, pp. 2645–2648, 2004.
[4] Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., Tagliasacchi, M., and Tubaro, S. , “An overview on video forensics.” APSIPA Transactions on Signal and Information Processing, vol.1, no.1, 2012.
[5] W. Wang and H. Farid, “Exposing digital forgeries in video by detecting double MPEG compression,” Proceedings of the 8th ACM workshop on Multimedia and Security, pp.37-47, 2006.
[6] W. Wang and Farid, H., “Exposing digital forgeries in interlaced and de-interlaced video,” IEEE Transactions on Information Forensics and Security, vol.2, no. 3, pp.438-449, 2007.
[7] M. Chen, J. Fridrich, M. Goljan, and J. Lukáš, “Source digital camcorder identification using sensor photo response non-uniformity,” Proceedings of SPIE on Security, Steganography, and Watermarking, vol. 6505, 2007.
[8] C. Kraetzer, A. Oermann, J. Dittmann, and A. Lang, “Digital audio forensics: A first practical evaluation on microphone and environment classification,” Proceedings of 9th ACM Workshop on Multimedia and Security, pp. 63–74, 2007.
[9] D. Garcia-Romero and C. Y. Espy-Wilson, “Automatic acquisition device identification from speech recordings,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.1806–1809, 2010.
[10] M. Kirchner and R. Böhme, “Hiding traces of resampling in digital images,” IEEE Transactions on Information Forensics Security, vol.3, no.4, pp. 582–592, 2008.
[11] T. Gloe, M. Kirchner, A. Winkler, and R. Böhme, “Can we trust digital image forensics?,” Proceedings of the15th ACM International Conference on Multimedia, pp.78–86, 2007.
[12] M. C. Stamm, S. K. Tjoa,W. S. Lin, and K. J. R. Liu, “Anti-forensics of JPEG compression,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 1694–1697, 2010.
[13] Stamm, M.C. and Liu, K.J.R., “Anti-Forensics for frame deletion/addition in mpeg video,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1876-1879, 2011.
[14] Stamm, M.C., Lin, W.S. and Liu, K.J.R., “Temporal Forensics and Anti-Forensics for Motion Compensated Video,” IEEE Transactions on Information Forensics and Security, vol.7, no.4, pp.1315-1329, 2012.
[15] He, Zhihai, and Dapeng Oliver Wu, “Linear rate control and optimum statistical multiplexing for H. 264 video broadcast,” IEEE Transactions on Multimedia, vol.10, no.7, pp.1237-1249, 2008.
[16] Ma, Siwei, Wen Gao, and Yan Lu, “Rate-distortion analysis for H. 264/AVC video coding and its application to rate control,” IEEE Transactions on Circuits and Systems for Video Technology, vol.15, no.12, pp. 1533-1544, 2005.
[17] Tel, Till Halbach., “Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG (ISO/IEC JTC1/SC29/WG11 and ITU-T SG16 Q. 6).”
[18] JM.18 Reference Software. [Online]. Available: http://iphome.hhi.de/suehring/tml/download/.
[19] Gabarda, Salvador, and Gabriel Cristóbal., “Blind image quality assessment through anisotropy,” The Journal of the Optical Society of America A, vol.24, no.12, pp.42-51, 2007. |