1 |
Kang Hyeon RHEE, "Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image," Journal of The Institute of Electronics and Information Engineers, Vol. 51, No. 3, pp. 75-81, March 2014.
DOI
|
2 |
Hany Farid, "Image forgery detection," IEEE Signal Processing Magazine, Vol. 26, Issue: 2, pp.16-25, 2009.
DOI
|
3 |
Xiangui Kang, Matthew C. Stamm, Anjie Peng, and K. J. Ray Liu, "Robust Median Filtering Forensics Using an Autoregressive Model," IEEE Trans. on Information Forensics and Security, vol. 8, no. 9, pp. 1456-1468, Sept. 2013.
DOI
|
4 |
Tomas Pevny, "Steganalysis by Subtractive Pixel Adjacency Matrix," Information Forensics and Security, IEEE Transactions on, Vol. 5, pp. 215-224, 2010.
DOI
|
5 |
Duda, R. O., P. E. Hart, "Use of the Hough Transformation to Detect Lines and Curves in Pictures," Comm. ACM, Vol. 15, pp. 11-15, January 1972.
DOI
|
6 |
Kang Hyeon RHEE, "Forensic Detection of Median Filtering by Hough Transform of Digital Image," The 9th IEEE GCC Conference & Exhibition (Bahrain), May 2017.
|
7 |
Kang Hyeon RHEE, "Downscaling Forgery Detection using Pixel Value's Gradients of Digital Image," Journal of The Institute of Electronics and Information Engineers, Vol. 53, No. 2, pp. 47-52, Feb. 2016.
DOI
|
8 |
V. N. Vapnik, The Nature of Statistical Learning Theory. New York: Springer-Verlag, 1995.
|
9 |
Kang Hyeon RHEE, "Median filtering detection using variation of neighboring line pairs for image forensics," SPIE, Journal of Electronic Imaging, 25(5), 2016.
|
10 |
G. Schaefer and M. Stich, "UCID - An uncompressed colour image database," in Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, 2004, pp. 472-480
|