參考文獻 |
References
[1] A. Gallagher. “Detection of linear and cubic interpolation in JPEG compressed images. In Computer and Robot Vision”, Proc. The 2nd Canadian Conference on, .pp. 65–72, May (2005).
[2] A. C. Popescu and H. Farid. “Exposing digital forgeries by detecting traces of re-sampling”. IEEE Transactions on Signal Processing, 53(2): pp.758-767, (2005).
[3] A. C. Popescu and H. Farid. “Statistical tools for digital forensics”. In Lecture notes in computer science: 7th International Workshop on Information Hiding, pp. 128-147, (2005).
[4] W. Luo, Z. Qu, J. Huang, and G. Qiu, “A novel method for detecting cropped and recompressed image block,” in Proc. IEEE Conf. Acoustics, Speech and Signal Processing, Honolulu, HI, 2007, pp. 217–220.
[5] C. Cortes and V. Vapnik. “Support-Vector Networks, Machine Learning”. pp. 273-297, September (1995)
[6] G. Schaefer and M. Stich. “UCID: an uncompressed color image database”. Proc. SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia. (2004)
[7] S. Avidan and A. Shamir. “Seam carving for content-aware image resizing”. ACM Trans. Graph., 26(3):10, Vol. 26. (2007).
[8] G Gordon and R Tibshirani, “Karush-Kuhn-Tucker conditions,” Optimization.
[9] A. C. Gallagher, “Detection of linear and cubic interpolation in jpeg compressed images,” in Proc. 2nd Canadian Conf. Computer and Robot Vision., Victoria, British Columbia, Canada, vol. 171, pp. 65–72, (2005).
[10] M. Kirchner, “Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue,” in ACM Multimedia and Security Workshop, pp. 11–20, (2008).
[11] H. Farid. “Image Forgery Detection”. IEEE Signal Processing Magazine, (2009) Vol. 26 pp. 16-25.
[12] J. Fridrich, D. Soukal, and J. Lukás, “Detection of copy move forgery in digital images,” in Proc. Digital Forensic Research Workshop, Aug. (2003).
[13] A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004-515, (2004).
[14] A. Sarkar, L. Nataraj, and B. S. Manjunath. “Detection of Seam Carving and Localization of Seam Insertions in Digital Images”, Proceeding MM&Sec ’09 Proceedings of the 11th ACM workshop on Multimedia and security pp. 107-116, (2009).
[15] Y. Q. Shi, C. Chen, and W. Chen. “A Markov process based approach to effective attacking JPEG steganography”. In Lecture notes in computer science: 8th International Workshop on Information Hiding, pp. 249-264, July (2006).
[16] Z. Fan and R. L. de Queiroz. “Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation”, IEEE Transactions on image processing, Vol. 12, No. 2, pp. 230-235 (2003).
[17] M. Rubinstein, A. Shamir, and S. Avidan. “Improved seam carving for video retargeting,” ACM Transactions on Graphics, Vol. 27, Issue 3 No. 16, Aug. (2008).
[18] G. K. Wallace. “The JPEG still picture compression standard”, Communications of the ACM - Special issue on digital multimedia systems, Vol. 34, Issue 4, pp. 30-44, Apr. (1991).
[19] J. Fridrich, D. Soukal, and J. Lukás. “Detection of copy move forgery in digital images”, Proc. Digital Forensic Research Workshop, Aug. 2003.
[20] T. K. Moon. “The expectation-maximization algorithm”, Signal Processing magazine, IEEE, Vol. 13, Issue 6, pp. 47-60, (1996).
[21] Weiqi Luo, Zhenhua Qu, Jiwu Huang, Guoping Qiu, “A novel method for detecting cropped and recompressed image blocks”, IEEE Acoustics, Speech and Signal Processing, Vol. 2, pp. 217-220 (2007).
[22] M. K. Johnson and H. Farid. “Exposing digital forgeries through chromatic aberration”, in Proc. ACM Multimedia and Security Workshop, Geneva, Switzerland, pp. 48–55, (2006).
[23] H. Farid and S. Lyu. “Higher-order wavelet statistics and their application to digital forensics,” in Proc. IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction with CVPR), Madison, WI, pp. 94 (2003). |