1 |
Kang Hyeon RHEE, "Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image, " IEIE, Journal of IEIE, Vol. 51, No. 3, pp. 75-81, March 2014.
|
2 |
Stamm, M.C., Min Wu, K.J.R. Liu, "Information Forensics: An Overview of the First Decade," Access IEEE, pp. 167-200, 2013.
|
3 |
Kang Hyeon RHEE, "Forensic Decision of Median Filtering by Pixel Value's Gradients of Digital Image," IEIE, Journal of IEIE, Vol. 52, No. 6, pp. 79-84, June 2015.
|
4 |
Kang Hyeon RHEE, "Framework of multimedia forensic system," Computing and Convergence Technology (ICCCT), 2012 7th International Conference on, IEEE Conf. Pub., pp. 1084-1087, 2012.
|
5 |
Chenglong Chen, Jiangqun Ni and Jiwu Huang, "Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach," Image Processing, IEEE Transactions on, Vol. 22, pp. 4699-4710, 2013.
DOI
ScienceOn
|
6 |
Xiangui Kang, Matthew C. Stamm, Anjie Peng, and K. J. Ray Liu, "Robust Median Filtering Forensics Using an Autoregressive Model," IEEE Trans. on Information Forensics and Security, vol. 8, no. 9, pp. 1456-1468, Sept. 2013.
DOI
ScienceOn
|
7 |
H. Yuan, "Blind forensics of median filtering in digital images," IEEE Trans. Inf. Forensics Security, Vol. 6, no. 4, pp. 1335-1345, Dec. 2011.
DOI
ScienceOn
|
8 |
Tomas Pevny, "Steganalysis by Subtractive Pixel Adjacency Matrix," Information Forensics and Security, IEEE Transactions on, Vol. 5, pp. 215-224, 2010.
DOI
ScienceOn
|
9 |
Yujin Zhang, Shenghong Li, Shilin Wang and Yun Qing Shi, "Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns," Signal Processing Letters, IEEE, Vol. 21, pp. 275-279, 2014.
DOI
ScienceOn
|
10 |
G. Cao, Y. Zhao, R. Ni, L. Yu, and H. Tian, "Forensic detection of median filtering in digital images," in Multimedia and Expo (ICME), 2010, Jul. 2010, pp. 89-94, 2010.
|
11 |
S. M. Kay, Modern Spectral Estimation: Theory and Application, Englewood Cliffs, NJ, USA: Prentice-Hall, 1998.
|
12 |
M. Kirchner and J. Fridrich, "On detection of median filtering in digital images." In Proc. SPIE, Electronic Imaging, Media Forensics and Security II, vol. 7541, pp. 1-12, 2010.
|