1 |
Kang Hyeon RHEE, "Median Filtering Detection using Latent Growth Modeling", Journal of The Institute of Electronics and Information Engineers, Vol. 52, No. 1, pp. 61-68, 2015.1.
DOI
ScienceOn
|
2 |
Kang Hyeon RHEE, "Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image", Journal of The Institute of Electronics and Information Engineers, Vol. 51, No. 3, pp. 75-81, 2014.3.
DOI
|
3 |
Chenglong Chen, Jiangqun Ni and Jiwu Huang, "Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach," Image Processing, IEEE Transactions on, Vol. 22, pp. 4699-4710, 2013.
DOI
ScienceOn
|
4 |
H. Yuan, "Blind forensics of edianfiltering in digital images," IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1335-1345, Dec. 2011.
DOI
ScienceOn
|
5 |
Tomas Pevny, "Steganalysis by Subtractive Pixel Adjacency Matrix," Information Forensics and Security, IEEE Transactions on, Vol. 5, pp. 215-224, 2010.
DOI
ScienceOn
|
6 |
Yujin Zhang, Shenghong Li, Shilin Wang and Yun Qing Shi, "Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns," Signal Processing Letters, IEEE, Vol. 21, pp. 275-279, 2014.
DOI
ScienceOn
|
7 |
Xiangui Kang, Matthew C. Stamm, Anjie Peng, and K. J. Ray Liu, "Robust Median Filtering Forensics Using an Autoregressive Model," IEEE Trans. on Information Forensics and Security, vol. 8, no. 9, pp. 1456-1468, Sept. 2013.
DOI
ScienceOn
|
8 |
http://homepages.lboro.ac.uk/-cogs/datasets/ucid/ucid.html (2015.4.1)
|
9 |
Kang Hyeon RHEE, "Framework of multimedia forensic system," Computing and Convergence Technology (ICCCT), 2012 7th International Conferenceon, IEEE Conf. Pub., pp. 1084-1087, 2012.
|