1 |
Kang Hyeon RHEE, "Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image," Journal of the Institute of Electronics and Information Engineers, Vol. 51, No. 3, pp. 75-81, Mar. 2014.
과학기술학회마을
DOI
|
2 |
Il Yong CHUNG and Kang Hyeon RHEE, "Traitor Traceability of Colluded Multimedia Fingerprinting code Using Hamming Distance on XOR Collusion Attack," Journal of the Institute of Electronics and Information Engineers, Vol. 50, No. 7, pp. 175-180, July. 2013.
과학기술학회마을
DOI
ScienceOn
|
3 |
M. Kirchner and J. Fridrich, "On detection of median filtering in digital images," in Proc. SPIE, Electron. Imaging, Media Forensics and Security II, vol. 7541, pp. 1-12, 2010.
|
4 |
A. D. Ker and R. Bohme, "Revisiting weighted stego-image stegoanalysis," in Proc. SPIE, Electron. Imaging: Security, Forensics, Steganography and Watermarking of Multimedia Contents X, Vol. 6819, p. 5, 2008.
|
5 |
Xiangui Kang, Matthew C. Stamm, Anjie Peng, and K. J. Ray Liu, "Robust Median Filtering Using an Autoregressive Model," IEEE Trans. on Information Forensics and Security, Vol. 8, no. 9, pp. 1456-1468, Sept. 2013.
DOI
ScienceOn
|
6 |
G. Cao, Y. Zhao, R. Ni, L. Yu, and H. Tian, "Forensic detection of median filtering in digital images," in Multimedia and Expo (ICME), 2010, Jul. 2010, pp. 89-94. 2010.
|
7 |
H. Yuan, "Blind forensics of median filtering in digital images," IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1335-1345, Dec.2 011.
DOI
ScienceOn
|
8 |
Matthias Kirchner and Rainer B hme, "Tamper hiding: Defeating image forensics.," in Infor. Hiding '07, Jun. 2007, pp. 326-341, 2007.
|
9 |
Stamm, M.C., Min Wu, Liu, K.J.R., "Information Forensics: An Overview of the First Decade," Access IEEE, pp. 167-200, 2013.
|
10 |
C. Chen, J. Ni, R. Huang, and J. Huang, "Blind median filtering detection using statistics in difference domain," in Proc. of Infor. Hiding '12, May 2012.
|
11 |
http://bows2.ec-lille.fr/ (Aug. 2014)
|