@inproceedings{bb349400, AUTHOR = "Bahat, Y. and Michaeli, T.", TITLE = "What's in the Image? Explorable Decoding of Compressed Images", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "2907-2916", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343659"} @inproceedings{bb349401, AUTHOR = "Xiang, Z.Y. and Horvath, J. and Baireddy, S. and Bestagini, P. and Tubaro, S. and Delp, E.J.", TITLE = "Forensic Analysis of Video Files Using Metadata", BOOKTITLE = WMF21, YEAR = "2021", PAGES = "1042-1051", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343660"} @inproceedings{bb349402, AUTHOR = "Yin, Q. and Wang, J. and Luo, X.Y.", TITLE = "A Hybrid Loss Network for Localization of Image Manipulation", BOOKTITLE = IWDW20, YEAR = "2020", PAGES = "237-247", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343661"} @inproceedings{bb349403, AUTHOR = "Zeng, H. and Deng, K. and Peng, A.", TITLE = "ISO Setting Estimation Based on Convolutional Neural Network and its Application in Image Forensics", BOOKTITLE = IWDW20, YEAR = "2020", PAGES = "224-236", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343662"} @inproceedings{bb349404, AUTHOR = "Zhao, J.J. and Wang, J.W.", TITLE = "Lightweight DCT-Like Domain Forensics Model for Adversarial Example", BOOKTITLE = IWDW20, YEAR = "2020", PAGES = "265-279", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343663"} @inproceedings{bb349405, AUTHOR = "Camacho, I.C. and Wang, K.", TITLE = "Data-dependent Scaling of CNN's First Layer for Improved Image Manipulation Detection", BOOKTITLE = IWDW20, YEAR = "2020", PAGES = "208-223", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343664"} @inproceedings{bb349406, AUTHOR = "Reichman, B. and Jing, L.L. and Akin, O. and Tian, Y.", TITLE = "Medical Image Tampering Detection: A New Dataset and Baseline", BOOKTITLE = AIHA20, YEAR = "2020", PAGES = "266-277", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343665"} @inproceedings{bb349407, AUTHOR = "Berthet, A. and Dugelay, J.L.", TITLE = "A review of data preprocessing modules in digital image forensics methods using deep learning", BOOKTITLE = VCIP20, YEAR = "2020", PAGES = "281-284", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343666"} @inproceedings{bb349408, AUTHOR = "Ghosh, A. and Zhong, Z. and Cruz, S. and Veeravasarapu, S. and Singh, M. and Boult, T.E.", TITLE = "Infoprint: Information Theoretic Digital Image Forensics", BOOKTITLE = ICIP20, YEAR = "2020", PAGES = "638-642", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343667"} @inproceedings{bb349409, AUTHOR = "Maier, A. and Lorch, B. and Riess, C.", TITLE = "Toward Reliable Models For Authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks", BOOKTITLE = ICIP20, YEAR = "2020", PAGES = "1251-1255", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343668"} @inproceedings{bb349410, AUTHOR = "Rouis, K. and Gomez Kramer, P. and Coustaty, M.", TITLE = "Local Geometry Analysis For Image Tampering Detection", BOOKTITLE = ICIP20, YEAR = "2020", PAGES = "2551-2555", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343669"} @inproceedings{bb349411, AUTHOR = "Rabah, C.B. and Coatrieux, G. and Abdelfattah, R.", TITLE = "The Supatlantique Scanned Documents Database for Digital Image Forensics Purposes", BOOKTITLE = ICIP20, YEAR = "2020", PAGES = "2096-2100", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343670"} @inproceedings{bb349412, AUTHOR = "Hu, X.F. and Zhang, Z.H. and Jiang, Z.Y. and Chaudhuri, S. and Yang, Z.H. and Nevatia, R.", TITLE = "SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXI:312-328", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343671"} @inproceedings{bb349413, AUTHOR = "Hosier, B.C. and Stamm, M.C.", TITLE = "Detecting Video Speed Manipulation", BOOKTITLE = WMF20, YEAR = "2020", PAGES = "2860-2869", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343672"} @inproceedings{bb349414, AUTHOR = "Jain, A. and Majumdar, P. and Singh, R. and Vatsa, M.", TITLE = "Detecting GANs and Retouching based Digital Alterations via DAD-HCNN", BOOKTITLE = WMF20, YEAR = "2020", PAGES = "2870-2879", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343673"} @inproceedings{bb349415, AUTHOR = "Andujar, R. and Peletier, I. and Oliva, J. and Cymontkowski, M. and Fu, Y. and Tang, E. and Allman, J.", TITLE = "Video Tampering Detection for Decentralized Video Transcoding Networks", BOOKTITLE = ICIAR20, YEAR = "2020", PAGES = "I:316-327", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343674"} @inproceedings{bb349416, AUTHOR = "Novozamsky, A. and Mahdian, B. and Saic, S.", TITLE = "IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images", BOOKTITLE = WACVWS20, YEAR = "2020", PAGES = "71-80", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343675"} @inproceedings{bb349417, AUTHOR = "Pourreza, R. and Ghodrati, A. and Habibian, A.", TITLE = "Recognizing Compressed Videos: Challenges and Promises", BOOKTITLE = RLQ19, YEAR = "2019", PAGES = "999-1007", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343676"} @inproceedings{bb349418, AUTHOR = "Nam, S. and Ahn, W. and Mun, S. and Park, J. and Kim, D. and Yu, I. and Lee, H.", TITLE = "Content-Aware Image Resizing Detection Using Deep Neural Network", BOOKTITLE = ICIP19, YEAR = "2019", PAGES = "106-110", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343677"} @inproceedings{bb349419, AUTHOR = "Giudice, O. and Guarnera, L. and Paratore, A.B. and Farinella, G.M. and Battiato, S.", TITLE = "Siamese Ballistics Neural Network", BOOKTITLE = ICIP19, YEAR = "2019", PAGES = "4045-4049", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343678"} @inproceedings{bb349420, AUTHOR = "Niyitegeka, D. and Coatrieux, G. and Bellafqira, R. and Genin, E. and Franco Contreras, J.", TITLE = "Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases: Application to Outsourced Genetic Data", BOOKTITLE = IWDW18, YEAR = "2018", PAGES = "151-166", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343679"} @inproceedings{bb349421, AUTHOR = "Ye, J.Y. and Shi, Y.X. and Xu, G.S. and Shi, Y.Q.", TITLE = "A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images", BOOKTITLE = IWDW18, YEAR = "2018", PAGES = "3-13", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343680"} @inproceedings{bb349422, AUTHOR = "Zampoglou, M. and Markatopoulou, F. and Mercier, G. and Touska, D. and Apostolidis, E. and Papadopoulos, S. and Cozien, R. and Patras, I. and Mezaris, V. and Kompatsiaris, I.", TITLE = "Detecting Tampered Videos with Multimedia Forensics and Deep Learning", BOOKTITLE = "MMMod19", YEAR = "2019", PAGES = "I:374-386", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343681"} @inproceedings{bb349423, AUTHOR = "Diallo, B. and Urruty, T. and Bourdon, P. and Fernandez Maloigne, C.", TITLE = "Improving Robustness of Image Tampering Detection for Compression", BOOKTITLE = "MMMod19", YEAR = "2019", PAGES = "I:387-398", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343682"} @inproceedings{bb349424, AUTHOR = "Cruz, F. and Sidere, N. and Coustaty, M. and d'Andecy, V.P. and Ogier, J.M.", TITLE = "Categorization of Document Image Tampering Techniques and How to Identify Them", BOOKTITLE = IWCF18, YEAR = "2018", PAGES = "117-124", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343683"} @inproceedings{bb349425, AUTHOR = "Lin, L. and Chen, W. and Wang, Y. and Reinder, S. and Guan, Y. and Newman, J. and Wu, M.", TITLE = "The Impact of Exposure Settings in Digital Image Forensics", BOOKTITLE = ICIP18, YEAR = "2018", PAGES = "540-544", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343684"} @inproceedings{bb349426, AUTHOR = "Pinto, A. and Moreira, D. and Bharati, A. and Brogan, J. and Bowyer, K.W. and Flynn, P.J. and Scheirer, W. and Rocha, A.", TITLE = "Provenance filtering for multimedia phylogeny", BOOKTITLE = ICIP17, YEAR = "2017", PAGES = "1502-1506", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343685"} @inproceedings{bb349427, AUTHOR = "Bharati, A. and Moreira, D. and Pinto, A. and Brogan, J. and Bowyer, K.W. and Flynn, P.J. and Scheirer, W. and Rocha, A.", TITLE = "U-Phylogeny: Undirected provenance graph construction in the wild", BOOKTITLE = ICIP17, YEAR = "2017", PAGES = "1517-1521", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343686"} @inproceedings{bb349428, AUTHOR = "Wengrowski, E. and Sun, Z.H. and Hoogs, A.", TITLE = "Reflection correspondence for exposing photograph manipulation", BOOKTITLE = ICIP17, YEAR = "2017", PAGES = "4317-4321", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343687"} @inproceedings{bb349429, AUTHOR = "Bappy, J.H. and Roy Chowdhury, A.K. and Bunk, J. and Nataraj, L. and Manjunath, B.S.", TITLE = "Exploiting Spatial Structure for Localizing Manipulated Image Regions", BOOKTITLE = ICCV17, YEAR = "2017", PAGES = "4980-4989", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343688"} @inproceedings{bb349430, AUTHOR = "Goli, M.S. and Naghsh, A.", TITLE = "Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku", BOOKTITLE = IPRIA17, YEAR = "2017", PAGES = "237-242", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343689"} @inproceedings{bb349431, AUTHOR = "Behravan, B. and Naghsh, A.", TITLE = "Introducing a new method of image reconstruction against crop attack using sudoku watermarking algorithm", BOOKTITLE = IPRIA17, YEAR = "2017", PAGES = "177-181", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343690"} @inproceedings{bb349432, AUTHOR = "Maigrot, C. and Kijak, E. and Sicre, R. and Claveau, V.", TITLE = "Tampering Detection and Localization in Images from Social Networks: A CBIR Approach", BOOKTITLE = CIAP17, YEAR = "2017", PAGES = "I:750-761", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343691"} @inproceedings{bb349433, AUTHOR = "Cozzolino, D. and Marra, F. and Poggi, G. and Sansone, C. and Verdoliva, L.", TITLE = "PRNU-Based Forgery Localization in a Blind Scenario", BOOKTITLE = CIAP17, YEAR = "2017", PAGES = "II:569-579", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343692"} @inproceedings{bb349434, AUTHOR = "Bondi, L. and Lameri, S. and Guera, D. and Bestagini, P. and Delp, E.J. and Tubaro, S.", TITLE = "Tampering Detection and Localization Through Clustering of Camera-Based CNN Features", BOOKTITLE = MedForen17, YEAR = "2017", PAGES = "1855-1864", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343693"} @inproceedings{bb349435, AUTHOR = "Chen, B.C. and Davis, L.S.", TITLE = "Deep Representation Learning for Metadata Verification", BOOKTITLE = IVF19, YEAR = "2019", PAGES = "73-82", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343694"} @inproceedings{bb349436, AUTHOR = "Chen, B.C. and Ghosh, P. and Morariu, V.I. and Davis, L.S.", TITLE = "Detection of Metadata Tampering Through Discrepancy Between Image Content and Metadata Using Multi-task Deep Learning", BOOKTITLE = MedForen17, YEAR = "2017", PAGES = "1872-1880", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343695"} @inproceedings{bb349437, AUTHOR = "Bolles, R. and Burns, J.B. and Graciarena, M. and Kathol, A. and Lawson, A. and McLaren, M. and Mensink, T.", TITLE = "Spotting Audio-Visual Inconsistencies (SAVI) in Manipulated Video", BOOKTITLE = MedForen17, YEAR = "2017", PAGES = "1907-1914", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343696"} @inproceedings{bb349438, AUTHOR = "Asaad, A. and Jassim, S.", TITLE = "Topological Data Analysis for Image Tampering Detection", BOOKTITLE = IWDW17, YEAR = "2017", PAGES = "136-146", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343697"} @inproceedings{bb349439, AUTHOR = "Choi, H.Y. and Jang, H.U. and Kim, D. and Son, J. and Mun, S.M. and Choi, S. and Lee, H.K.", TITLE = "Detecting composite image manipulation based on deep neural networks", BOOKTITLE = WSSIP17, YEAR = "2017", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343698"} @inproceedings{bb349440, AUTHOR = "He, X. and Guan, Q.X. and Tong, Y.F. and Zhao, X.F. and Yu, H.B.", TITLE = "A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation", BOOKTITLE = IWDW16, YEAR = "2016", PAGES = "145-158", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343699"} @inproceedings{bb349441, AUTHOR = "Le Philippe, N. and Puech, W. and Fiorio, C.", TITLE = "Phylogeny of JPEG images by ancestor estimation using missing markers on image pairs", BOOKTITLE = IPTA16, YEAR = "2016", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343700"} @inproceedings{bb349442, AUTHOR = "Ho, A.T.P. and Wang, K. and Cayre, F.", TITLE = "An effective histogram-based approach to JPEG-100 forensics", BOOKTITLE = IPTA16, YEAR = "2016", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343701"} @inproceedings{bb349443, AUTHOR = "Serizel, R. and Bisot, V. and Essid, S. and Richard, G.", TITLE = "Machine listening techniques as a complement to video image analysis in forensics", BOOKTITLE = ICIP16, YEAR = "2016", PAGES = "948-952", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343702"} @inproceedings{bb349444, AUTHOR = "Rana, A. and Valenzise, G. and DuFaux, F.", TITLE = "An evaluation of HDR image matching under extreme illumination changes", BOOKTITLE = VCIP16, YEAR = "2016", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343703"} @inproceedings{bb349445, AUTHOR = "Fan, W. and Valenzise, G. and Banterle, F. and DuFaux, F.", TITLE = "Forensic detection of inverse tone mapping in HDR images", BOOKTITLE = ICIP16, YEAR = "2016", PAGES = "166-170", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343704"} @inproceedings{bb349446, AUTHOR = "Hagui, M. and Boukhris, A. and Mahjoub, M.A.", TITLE = "Comparative Study and Enhancement of Camera Tampering Detection Algorithms", BOOKTITLE = CGiV16, YEAR = "2016", PAGES = "226-231", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343705"} @inproceedings{bb349447, AUTHOR = "Alfraih, A.S. and Briffa, J.A. and Wesemeyer, S.", TITLE = "Cloning Localization Based on Feature Extraction and K-means Clustering", BOOKTITLE = IWDW14, YEAR = "2014", PAGES = "410-419", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343706"} @inproceedings{bb349448, AUTHOR = "Kao, D.Y. and Chiu, Y.H.", TITLE = "An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics", BOOKTITLE = IWDW14, YEAR = "2014", PAGES = "498-512", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343707"} @inproceedings{bb349449, AUTHOR = "Lu, J.F. and Huang, Q. and Wang, M. and Li, L. and Dai, J.P. and Chang, C.C.", TITLE = "Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack", BOOKTITLE = IWDW14, YEAR = "2014", PAGES = "187-198", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343708"} @inproceedings{bb349450, AUTHOR = "Xu, G.S. and Ye, J.Y. and Shi, Y.Q.", TITLE = "New Developments in Image Tampering Detection", BOOKTITLE = IWDW14, YEAR = "2014", PAGES = "3-17", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343709"} @inproceedings{bb349451, AUTHOR = "Peng, A. and Zeng, H. and Lin, X.D. and Kang, X.G.", TITLE = "Countering anti-forensics of image resampling", BOOKTITLE = ICIP15, YEAR = "2015", PAGES = "3595-3599", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343710"} @inproceedings{bb349452, AUTHOR = "Zolotavkin, Y. and Juhola, M.", TITLE = "Quantization Based Watermarking Approach with Gain Attack Recovery", BOOKTITLE = DICTA14, YEAR = "2014", PAGES = "1-8", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343711"} @inproceedings{bb349453, AUTHOR = "Valenzise, G. and Tagliasacchi, M. and Tubaro, S.", TITLE = "Detectability-quality trade-off in JPEG counter-forensics", BOOKTITLE = ICIP14, YEAR = "2014", PAGES = "5337-5341", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343712"} @inproceedings{bb349454, AUTHOR = "Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.", TITLE = "Image forgery detection through residual-based local descriptors and block-matching", BOOKTITLE = ICIP14, YEAR = "2014", PAGES = "5297-5301", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343713"} @inproceedings{bb349455, AUTHOR = "Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.", TITLE = "Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques", BOOKTITLE = ICIP14, YEAR = "2014", PAGES = "5302-5306", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343714"} @inproceedings{bb349456, AUTHOR = "Ravi, H. and Subramanyam, A.V. and Gupta, G. and Kumar, B.A.", TITLE = "Compression noise based video forgery detection", BOOKTITLE = ICIP14, YEAR = "2014", PAGES = "5352-5356", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343715"} @inproceedings{bb349457, AUTHOR = "Ferreira, A. and Rocha, A.", TITLE = "A Multiscale and Multi-Perturbation Blind Forensic Technique for Median Detecting", BOOKTITLE = CIARP14, YEAR = "2014", PAGES = "302-310", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343716"} @inproceedings{bb349458, AUTHOR = "Lalitha, M. and Holalad, H. and Rajput, S. and Muktanidhi, S.D. and Mudenagudi, U.", TITLE = "A classifier framework for the detection of doctored images", BOOKTITLE = NCVPRIPG13, YEAR = "2013", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343717"} @inproceedings{bb349459, AUTHOR = "Mall, V. and Roy, A.K. and Mitra, S.K.", TITLE = "Digital image tampering detection and localization using singular value decomposition technique", BOOKTITLE = NCVPRIPG13, YEAR = "2013", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343718"} @inproceedings{bb349460, AUTHOR = "Gao, S. and Zhang, C. and Wu, C.L. and Ye, G. and Huang, L.", TITLE = "A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image", BOOKTITLE = IWDW13, YEAR = "2013", PAGES = "303-313", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343719"} @inproceedings{bb349461, AUTHOR = "Shen, C. and Cai, Z.M. and Maxion, R.A. and Guan, X.H.", TITLE = "On User Interaction Behavior as Evidence for Computer Forensic Analysis", BOOKTITLE = IWDW13, YEAR = "2013", PAGES = "221-231", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343720"} @inproceedings{bb349462, AUTHOR = "Comesana, P. and Perez Gonzalez, F. and Liste, N.", TITLE = "Quantization lattice estimation for multimedia forensics", BOOKTITLE = ICIP13, YEAR = "2013", PAGES = "4452-4456", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343721"} @inproceedings{bb349463, AUTHOR = "Wu, C.M.", TITLE = "Multi-level tamper detection and recovery with tamper type identification", BOOKTITLE = ICIP13, YEAR = "2013", PAGES = "4512-4516", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343722"} @inproceedings{bb349464, AUTHOR = "Conotter, V. and Comesana, P. and Perez Gonzalez, F.", TITLE = "Forensic analysis of full-frame linearly filtered JPEG images", BOOKTITLE = ICIP13, YEAR = "2013", PAGES = "4517-4521", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343723"} @inproceedings{bb349465, AUTHOR = "Jain, R. and Doermann, D.S.", TITLE = "Localized document image change detection", BOOKTITLE = ICDAR15, YEAR = "2015", PAGES = "786-790", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343724"} @inproceedings{bb349466, AUTHOR = "Jain, R. and Doermann, D.S.", TITLE = "VisualDiff: Document Image Verification and Change Detection", BOOKTITLE = ICDAR13, YEAR = "2013", PAGES = "40-44", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343725"} @inproceedings{bb349467, AUTHOR = "Tsesmelis, T. and Christensen, L. and Fihl, P. and Moeslund, T.B.", TITLE = "Tamper detection for active surveillance systems", BOOKTITLE = AVSS13, YEAR = "2013", PAGES = "57-62", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343726"} @inproceedings{bb349468, AUTHOR = "Pollard, S. and Simske, S. and Adams, G.", TITLE = "Print biometrics: Recovering forensic signatures from halftone images", BOOKTITLE = ICPR12, YEAR = "2012", PAGES = "1651-1654", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343727"} @inproceedings{bb349469, AUTHOR = "Li, H.D. and Luo, W.Q. and Huang, J.W.", TITLE = "Countering anti-JPEG compression forensics", BOOKTITLE = ICIP12, YEAR = "2012", PAGES = "241-244", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343728"} @inproceedings{bb349470, AUTHOR = "Maity, S.P. and Delpha, C.", TITLE = "Optimal watermark power and host samples allocation under random gain attack", BOOKTITLE = ICIP12, YEAR = "2012", PAGES = "2201-2204", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343729"} @inproceedings{bb349471, AUTHOR = "di Crescenzo, G. and Arce, G.", TITLE = "Data Forensics Constructions from Cryptographic Hashing and Coding", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "494-509", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343730"} @inproceedings{bb349472, AUTHOR = "Vazquez Padin, D. and Perez Gonzalez, F.", TITLE = "Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "306-320", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343731"} @inproceedings{bb349473, AUTHOR = "Zhang, R. and Wang, R.D. and Ng, T.T.", TITLE = "Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "292-305", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343732"} @inproceedings{bb349474, AUTHOR = "Chen, L. and Wang, S.L. and Li, S.H. and Li, J.H.", TITLE = "New Feature Presentation of Transition Probability Matrix for Image Tampering Detection", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "376-386", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343733"} @inproceedings{bb349475, AUTHOR = "Bateman, P.J. and Ho, A.T.S. and Briffa, J.A.", TITLE = "Image Forensics of High Dynamic Range Imaging", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "336-348", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343734"} @inproceedings{bb349476, AUTHOR = "Kwok, C.W. and Au, O.C. and Chui, S.H.", TITLE = "Alternative Anti-Forensics Method for Contrast Enhancement", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "398-410", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343735"} @inproceedings{bb349477, AUTHOR = "Chen, L. and Shi, Y.Q. and Sutthiwan, P. and Niu, X.X.", TITLE = "Non-uniform Quantization in Breaking HUGO", BOOKTITLE = IWDW13, YEAR = "2013", PAGES = "48-62", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343736"} @inproceedings{bb349478, AUTHOR = "Liu, H.M. and Li, L. and Li, J. and Huang, J.W.", TITLE = "Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "167-180", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343737"} @inproceedings{bb349479, AUTHOR = "Nguyen, H.C. and Katzenbeisser, S.", TITLE = "Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "387-397", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343738"} @inproceedings{bb349480, AUTHOR = "Jung, D.J. and Hyun, D.K. and Ryu, S.J. and Lee, J.W. and Lee, H.Y. and Lee, H.K.", TITLE = "Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "281-291", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343739"} @inproceedings{bb349481, AUTHOR = "Wu, R. and Li, X.L. and Yang, B.", TITLE = "Identifying computer generated graphics via histogram features", BOOKTITLE = ICIP11, YEAR = "2011", PAGES = "1933-1936", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343740"} @inproceedings{bb349482, AUTHOR = "Ananya, U and Mudenagudi, U.", TITLE = "Detection of doctored images using bispectral analysis", BOOKTITLE = ICIIP11, YEAR = "2011", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343741"} @inproceedings{bb349483, AUTHOR = "Zhu, S.Y. and Cao, X.C. and Zhao, H.D.", TITLE = "Photographic Composite Detection Using Two Circles", BOOKTITLE = ICIG11, YEAR = "2011", PAGES = "858-863", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343742"} @inproceedings{bb349484, AUTHOR = "Li, L. and Xue, J.R. and Wang, X.F. and Tian, L.", TITLE = "A Robust Approach to Detect Tampering by Exploring Correlation Patterns", BOOKTITLE = CAIP11, YEAR = "2011", PAGES = "II: 515-522", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343743"} @inproceedings{bb349485, AUTHOR = "Zhao, Y.Q. and Shih, F.Y. and Shi, Y.Q.", TITLE = "Passive Detection of Paint-Doctored JPEG Images", BOOKTITLE = DW10, YEAR = "2010", PAGES = "1-11", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343744"} @inproceedings{bb349486, AUTHOR = "Cao, H. and Kot, A.C.", TITLE = "Detection of Tampering Inconsistencies on Mobile Photos", BOOKTITLE = DW10, YEAR = "2010", PAGES = "105-119", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343745"} @inproceedings{bb349487, AUTHOR = "Wang, W. and Dong, J. and Tan, T.N.", TITLE = "Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise", BOOKTITLE = DW10, YEAR = "2010", PAGES = "120-133", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343746"} @inproceedings{bb349488, AUTHOR = "Serra Ruiz, J. and Megias, D.", TITLE = "DWT and TSVQ-based Semi-fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images", BOOKTITLE = PSIVT10, YEAR = "2010", PAGES = "331-336", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343747"} @inproceedings{bb349489, AUTHOR = "Goodwin, J. and Chetty, G.", TITLE = "Blind Video Tamper Detection Based on Fusion of Source Features", BOOKTITLE = DICTA11, YEAR = "2011", PAGES = "608-613", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343748"} @inproceedings{bb349490, AUTHOR = "Chetty, G. and Goodwin, J. and Singh, M.", TITLE = "Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features", BOOKTITLE = ACIVS10, YEAR = "2010", PAGES = "II: 79-87", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343749"} @inproceedings{bb349491, AUTHOR = "Wang, W. and Dong, J. and Tan, T.N.", TITLE = "Image tampering detection based on stationary distribution of Markov chain", BOOKTITLE = ICIP10, YEAR = "2010", PAGES = "2101-2104", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343750"} @inproceedings{bb349492, AUTHOR = "Ardizzone, E. and Bruno, A. and Mazzola, G.", TITLE = "Detecting multiple copies in tampered images", BOOKTITLE = ICIP10, YEAR = "2010", PAGES = "2117-2120", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343751"} @inproceedings{bb349493, AUTHOR = "Yao, X.Z. and Liu, H.M. and Rui, W. and Huang, J.W.", TITLE = "Content-based authentication algorithm for binary images", BOOKTITLE = ICIP09, YEAR = "2009", PAGES = "2893-2896", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343752"} @inproceedings{bb349494, AUTHOR = "Sutcu, Y. and Coskun, B. and Sencar, H.T. and Memon, N.", TITLE = "Tamper Detection Based on Regularity of Wavelet Transform Coefficients", BOOKTITLE = ICIP07, YEAR = "2007", PAGES = "I: 397-400", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343753"} @inproceedings{bb349495, AUTHOR = "Gou, H.M. and Swaminathan, A. and Wu, M.", TITLE = "Noise Features for Image Tampering Detection and Steganalysis", BOOKTITLE = ICIP07, YEAR = "2007", PAGES = "VI: 97-100", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343754"} @inproceedings{bb349496, AUTHOR = "Kihara, M. and Fujiyoshi, M. and Wan, Q.T. and Kiya, H.", TITLE = "Image Tamper Detection using Mathematical Morphology", BOOKTITLE = ICIP07, YEAR = "2007", PAGES = "VI: 101-104", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343755"} @inproceedings{bb349497, AUTHOR = "Roy, S. and Sun, Q.B.", TITLE = "Robust Hash for Detecting and Localizing Image Tampering", BOOKTITLE = ICIP07, YEAR = "2007", PAGES = "VI: 117-120", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343756"} @inproceedings{bb349498, AUTHOR = "Swaminathan, A. and Wu, M. and Liu, K.J.R.", TITLE = "Image Tampering Identification using Blind Deconvolution", BOOKTITLE = ICIP06, YEAR = "2006", PAGES = "2309-2312", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343757"} @inproceedings{bb349499, AUTHOR = "Wu, Y.D.", TITLE = "Tamper-Localization Watermarking with Systematic Error Correcting Code", BOOKTITLE = ICIP06, YEAR = "2006", PAGES = "1965-1968", BIBSOURCE = "http://www.visionbib.com/bibliography/char995ta1.html#TT343758"}