Multimedia forensics bibliography

This bibliography includes papers on digital forensics, multimedia security and some related topics. I have omitted papers on information hiding as these are covered by other online databases. You can sort the entries by year, author, category, etc. using the links below. I have included abstracts for papers where available; to view these, click on the expand icon Expand this entry next to the paper's title.

If you have any corrections or can suggest additional papers to include, please email me at the address on my home page. Many thanks to Matthias Kirchner for suggesting some further papers to include.

There are 267 entries.

top

Audio

Expand this entryRui Yang, Yun Qing Shi and Jiwu Huang
View documentDetecting double compression of audio signal 2010

Expand this entryHafiz Malik and Hany Farid
View documentAudio forensics from acoustic reverberation 2010

Expand this entryXiaoying Feng
View documentFLD-based detection of re-compressed speech signals 2010

top

CFA interpolation

View documentEfficient estimation of CFA pattern configuration in digital camera images 2010

Expand this entryYizhen Huang and N. Fan
View documentLearning from interpolated images using neural networks for digital forensics 2010

Expand this entryBo Wang, Xiangwei Kong and Xingang You
View documentSource camera identification using support vector machines 2009

Expand this entryHong Cao and Alex C. Kot
View documentAccurate detection of demosaicing regularity for digital image forensics 2009

View documentSynthesis of color filter array pattern in digital images 2009

Expand this entryMarie-Charlotte Poilpré, Patrick Perrot and Hugues Talbot
View documentImage tampering detection using Bayer interpolation and JPEG compression 2008

Expand this entryYizhen Huang and Yangjing Long
View documentDemosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model 2008

Expand this entryAndrew C. Gallagher and Tsuhan Chen
View documentImage authentication by detecting traces of demosaicing 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentClassification of digital cameras based on demosaicing artifacts 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on source camera-model identification based on CFA interpolation 2006

Expand this entryYangjing Long and Yizhen Huang
View documentImage based source camera identification using demosaicking 2006

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries in color filter array interpolated images 2005

Expand this entrySevinç Bayram, Husrev T. Sencar, Nasir D. Memon and İsmail Avcıbaş
View documentSource camera identification based on CFA interpolation 2005

Expand this entryYizhen Huang
View documentCan digital image forgery detection be unevadable? A case study: color filter array interpolation statistical feature recovery 2005

Expand this entryBryce E. Bayer
View documentColor imaging array 1976

top

Camera identification

Expand this entrySiwei Lyu
View documentEstimating vignetting function from a single image for image authentication 2010

Expand this entryMiroslav Goljan, Jessica Fridrich and Mo Chen
View documentSensor noise camera identification: countering counter-forensics 2010

Expand this entryMiroslav Goljan, Jessica Fridrich and Tomáš Filler
View documentManaging a large database of camera fingerprints 2010

View documentThe 'Dresden Image Database' for benchmarking digital image forensics 2010

Expand this entryThomas Gloe, Antje Winkler and Karsten Borowka
View documentEfficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics 2010

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentEfficient techniques for sensor fingerprint matching in large image and video databases 2010

Expand this entryIrene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni and Alessandro Piva
View documentEstimate of PRNU noise based on different noise models for source camera identification 2010

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for heavily JPEG compressed low resolution still images 2009

Expand this entryTian-Tsong Ng and Mao-Pei Tsui
View documentCamera response function signature for digital forensics — Part I: Theory and data selection 2009

Expand this entryTian-Tsong Ng
View documentCamera response function signature for digital forensics — Part II: Signature extraction 2009

Expand this entryGökhan Gül and İsmail Avcıbaş
View documentSource cell phone camera identification based on singular value decomposition 2009

Expand this entryYanmei Fang, Ahmet E. Dirik, Xiaoxi Sun and Nasir D. Memon
View documentSource class identification for DSLR and compact cameras 2009

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentDistinguishing between camera and scanned images by means of frequency analysis 2009

Expand this entrySimon Knight, Simon Moschou and Matthew Sorell
View documentAnalysis of sensor photo response non-uniformity in RAW images 2009

Expand this entryYue Li and Chang-Tsun Li
View documentDecomposed photo response non-uniformity for digital forensic analysis 2009

Expand this entryChi Zhang and Hongbin Zhang
View documentDigital camera identification based on curvelet transform 2009

Expand this entryGuanshuo Xu, Shang Gao, Yun Qing Shi, RuiMin Hu and Wei Su
View documentCamera-model identification using Markovian transition probability matrix 2009

Expand this entryWiger van Houten and Zeno J. M H. Geradts
View documentUsing sensor noise to identify low resolution compressed videos from youtube 2009

Expand this entryThomas Gloe, Karsten Borowka and Antje Winkler
View documentFeature-based camera model identification works in practice: results of a comprehensive evaluation study 2009

View documentDigital image forensics using sensor noise 2009

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for heavily JPEG compressed low resolution still images 2009

Expand this entryKurt Rosenfeld and Husrev T. Sencar
View documentA study of the robustness of PRNU-based camera identification 2009

Expand this entryMiroslav Goljan, Jessica Fridrich and Tomáš Filler
View documentLarge scale test of sensor fingerprint camera identification 2009

Expand this entryMartin S. Oliver
View documentUsing sensor dirt for toolmark analysis of digital photographs 2008

Expand this entryMartin S. Oliver
View documentOn the probability of a false positive match for digital camera identification based on sensor dirt location 2008

Expand this entryFanjie Meng, Xiangwei Kong and Xingang You
View documentA new feature-based method for source camera identification 2008

Expand this entryOya Çeliktutan, Bülent Sankur and İsmail Avcıbaş
View documentBlind identification of source cell-phone model 2008

Expand this entryTomáš Filler, Jessica Fridrich and Miroslav Goljan
View documentUsing sensor pattern noise for camera model identification 2008

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentDetermining image origin and integrity using sensor noise 2008

Expand this entryMiroslav Goljan and Jessica Fridrich
View documentCamera identification from cropped and scaled images 2008

Expand this entryMiroslav Goljan, Jessica Fridrich and Jan Lukáš
View documentCamera identification from printed images 2008

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for low resolution heavily compressed images 2008

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentDigital single lens reflex camera identification from traces of sensor dust 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentClassification of digital cameras based on demosaicing artifacts 2008

View documentA pattern classification framework for theoretical analysis of component forensics 2008

Expand this entryGreg J. Bloy
View documentBlind camera fingerprinting and image clustering 2008

View documentIntrinsic fingerprints for image authentication and steganalysis 2007

Expand this entryBülent Sankur, Oya Çeliktutan and İsmail Avcıbaş
View documentBlind identification of cellular phone cameras 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic classification of imaging sensor types 2007

Expand this entryMo Chen, Jessica Fridrich and Miroslav Goljan
View documentDigital imaging sensor identification (further study) 2007

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentSource digital camcorder identification using sensor photo response non-uniformity 2007

Expand this entryMiroslav Goljan, Mo Chen and Jessica Fridrich
View documentIdentifying common source digital camera from image pairs 2007

Expand this entryMo Chen, Jessica Fridrich, Jan Lukáš and Miroslav Goljan
View documentImaging sensor noise as digital X-ray for revealing forgeries 2007

Expand this entryYagiz Sutcu, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on sensor noise based source camera identification 2007

View documentOptimization of input pattern for semi non-intrusive component forensics of digital cameras 2007

View documentNon-intrusive component forensics of visual sensors using output images 2007

View documentA component estimation framework for information forensics 2007

Expand this entrySz-Han Chen and Chiou-Ting Hsu
View documentSource camera identification based on camera gain histogram 2007

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentSource camera identification based on sensor dust characteristics 2007

Expand this entryMin-Jen Tsai, Cheng-Liang Lai and Jung Liu
View documentCamera/mobile phone source identification for digital forensics 2007

Expand this entryTran Van Lanh, Kai-Sen Chong, Sabu Emmanuel and Mohan S. Kankanhalli
View documentA survey on digital camera image forensic methods 2007

Expand this entryLanh Tran Van, Sabu Emmanuel and Mohan S. Kankanhalli
View documentIdentifying source cell phone using chromatic aberration 2007

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDigital camera identification from sensor pattern noise 2006

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetecting digital image forgeries using sensor pattern noise 2006

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on source camera-model identification based on CFA interpolation 2006

Expand this entryKai San Choi, Edmund Y. Lam and Kenneth K. Y Wong
View documentSource camera identification using footprints from lens aberration 2006

View documentNon-intrusive forensic analysis of visual sensors using output images 2006

View documentComponent forensics of digital cameras: a non-intrusive approach 2006

Expand this entryMin-Jen Tsai and Guan-Hui Wu
View documentUsing image features to identify camera sources 2006

Expand this entryTian-Tsong Ng, Shih-Fu Chang and Mao-Pei Tsui
View documentCamera response function estimation from a single-channel image using differential invariants 2005

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetermining digital image origin using sensor imperfections 2005

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDigital `bullet scratches' for images 2005

Expand this entrySevinç Bayram, Husrev T. Sencar, Nasir D. Memon and İsmail Avcıbaş
View documentSource camera identification based on CFA interpolation 2005

Expand this entryOya Çeliktutan, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentSource cell-phone identification 2005

Expand this entryPaul Blythe and Jessica Fridrich
View documentSecure digital camera 2004

Expand this entryMehdi Kharrazi, Husrev T. Sencar and Nasir D. Memon
View documentBlind source camera identification 2004

Expand this entryZeno J. M H. Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentMethods for identification of images acquired with digital cameras 2001

Expand this entryKenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentCCD fingerprint method - identification of a video camera from videotaped images 1999

Expand this entryGary L. Friedman
View documentThe trustworthy digital camera: restoring credibility to the photographic image 1994

top

Compression

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentDigital image source coder forensics via intrinsic fingerprints 2009

Expand this entryRui Yang, Zhenhua Qu and Jiwu Huang
View documentDetecting digital audio forgeries by checking frame offsets 2008

Expand this entryCharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose and Gerald M. Masson
View documentSpot me if you can: uncovering spoken phrases in encrypted VoIP conversations 2008

Expand this entrySteven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentTransform coder classification for digital image forensics 2007

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentImage source coding forensics via intrinsic fingerprints 2007

top

Copy/move

Expand this entrySeung-Jin Ryu, Min-Jeong Lee and Heung-Kyu Lee
View documentDetection of copy-rotate-move forgery using Zernike moments 2010

Expand this entryXunyu Pan and Siwei Lyu
View documentDetecting image region duplication using SIFT features 2010

Expand this entryWeihai Li and Nenghai Yu
View documentRotation robust detection of copy-move forgery 2010

Expand this entryMauro Barni, Andrea Costanzo and Lara Sabatini
View documentIdentification of cut & paste tampering by means of double-JPEG detection and image segmentation 2010

Expand this entryEdoardo Ardizzone, Alessandro Bruno and Giuseppe Mazzola
View documentDetecting multiple copies in tampered images 2010

Expand this entryIrene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo and Giuseppe Serra
View documentGeometric tampering estimation by means of a SIFT-based forensic analysis 2010

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentAn efficient and robust method for detecting copy-move forgery 2009

Expand this entryBabak Mahdian and Stanislav Saic
View documentUsing noise inconsistencies for blind image forensics 2009

Expand this entryXiao-Bing Kang and Sheng-Min Wei
View documentIdentifying tampered regions using singular value decomposition in digital image forensics 2008

Expand this entryWeihai Li, Nenghai Yu and Yuan Yuan
View documentDoctored JPEG image detection 2008

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentDetecting copy-paste forgery of JPEG image via block artifact grid extraction 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentAn efficient and robust method for detecting copy-move forgery (poster) 2008

Expand this entryWeiqi Luo, Zhenhua Qu, Jiwu Huang and Guoping Qui
View documentA novel method for detecting cropped and recompressed image block 2007

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection of copy-move forgery using a method based on blur moment invariants 2007

Expand this entryAaron Langille and Minglun Gong
View documentAn efficient match-based duplication detection algorithm 2006

Expand this entryWeiqi Luo, Jiwu Huang and Guoping Qui
View documentRobust detection of region-duplication forgery in digital images 2006

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries by detecting duplicated image regions 2004

Expand this entryJessica Fridrich, David Soukal and Jan Lukáš
View documentDetection of copy-move forgery in digital images 2003

top

Digital evidence

Expand this entryMatthew Stamm, Steven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentAnti-forensics of JPEG compression 2010

Expand this entryMiroslav Goljan, Jessica Fridrich and Mo Chen
View documentSensor noise camera identification: countering counter-forensics 2010

View documentCan we trust digital image forensics? 2007

Expand this entryHerbert L. Blitzer and Jack Jacobia
View documentForensic Digital Imaging and Photography 2002

Expand this entryGovernment Response to House of Lords
View documentSelect committee on science and technology eighth report: digital images as evidence (government response) 1998

top

General

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlind methods for detecting image fakery 2010

Expand this entryWeihong Wang, Jing Dong and Tieniu Tan
View documentA survey of passive image tampering detection 2009

View documentMultimedia forensics is not computer forensics 2009

View documentA survey of image forgery detection 2009

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlinds methods for detecting image fakery 2008

Expand this entryHusrev T. Sencar and Nasir D. Memon
View documentOverview of state-of-the-art in digital image forensics, in 'Statistical Science and Interdisciplinary Research' 2008

View documentDeception: methods, motives, contexts and consequences 2007

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Ching-Yung Lin and Qibin Sun
View documentPassive-blind image forensics 2006

View documentDigital doctoring: how to tell the real from the fake 2006

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

top

JPEG

View documentExact JPEG recompression 2010

Expand this entryMatthew Stamm, Steven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentAnti-forensics of JPEG compression 2010

Expand this entryYi-Lei Chen and Chiou-Ting Hsu
View documentDetecting doubly compressed images based on quantization noise model and image restoration 2009

Expand this entryQingzhong Liu and Andrew H. Sung
View documentA new approach for JPEG resize and image splicing detection 2009

Expand this entryChang-Tsun Li
View documentDetection of block artifacts for digital forensic analysis 2009

View documentTowards copy-evident JPEG images 2009

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentPassive detection of doctored JPEG image via block artifact grid extraction 2009

Expand this entryZhouchen Lin, Junfeng He, Xiaoou Tang and Chi-Keung Tang
View documentFast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis 2009

View documentExposing digital forgeries from JPEG ghosts 2009

Expand this entryBin Li, Yun Qing Shi and Jiwu Huang
View documentDetecting doubly compressed JPEG images by using mode based first digit features 2008

Expand this entryYi-Lei Chen and Chiou-Ting Hsu
View documentImage tampering detection by blocking periodicity analysis in JPEG compressed images 2008

Expand this entryNicholas Zhong-Yang Ho and Ee-Chien Chang
View documentResidual information of redacted images hidden in the compression artifacts 2008

Expand this entryJesse D. Kornblum
View documentUsing JPEG quantization tables to identify imagery processed by software 2008

Expand this entryMarie-Charlotte Poilpré, Patrick Perrot and Hugues Talbot
View documentImage tampering detection using Bayer interpolation and JPEG compression 2008

Expand this entryWeihai Li, Nenghai Yu and Yuan Yuan
View documentDoctored JPEG image detection 2008

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentDetecting copy-paste forgery of JPEG image via block artifact grid extraction 2008

View documentDigital image ballistics from JPEG quantization: a followup study 2008

View documentExact JPEG recompression and forensics using interval arithmetic (poster/slides) 2008

Expand this entryThomás Pevný and Jessica Fridrich
View documentDetection of double-compression in JPEG images for applications in steganography 2008

Expand this entryZhenhua Qu, Weiqi Luo and Jiwu Huang
View documentA convolutive mixing model for shifted double JPEG compression with application to passive image authentication 2008

Expand this entryShuiming Ye, Qibin Sun and Ee-Chien Chang
View documentDetecting digital image forgeries by measuring inconsistencies of blocking artifact 2007

Expand this entryDongdong Fu, Yun Qing Shi and Wei Su
View documentA generalized Benford's law for JPEG coefficients and its applications in image forensics 2007

View documentDigital image ballistics from JPEG quantization 2006

Expand this entryRamesh Neelamani, Ricardo L. de Queiroz, Zhigang Fan, Sanjeeb Dash and Richard G. Baraniuk
View documentJPEG compression history estimation for color images 2006

Expand this entryJunfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang
View documentDetecting doctored JPEG-images via DCT coefficient analysis 2006

Expand this entryMathias Schlauweg, Torsten Palfner, Dima Pröfrock and Erika Müller
View documentThe Achilles' heel of JPEG-based image authentication 2005

View documentDetection of linear and cubic interpolation in JPEG compressed images 2005

Expand this entryHeinz H. Bauschke, Christopher H. Hamilton, Mason S. Macklem, Justin S. McMichael and Nicholas R. Swart
View documentRecompression of JPEG images by requantization 2003

Expand this entryJan Lukáš and Jessica Fridrich
View documentEstimation of primary quantization matrix in double compressed JPEG images 2003

Expand this entryZhigang Fan and Ricardo L. de Queiroz
View documentIdentification of bitmap compression history: JPEG detection and quantizer estimation 2003

Expand this entryIndependent JPEG Group
View documentIJG JPEG codec 1997

Expand this entryJoint Photographic Experts Group
View documentJPEG Standard (JPEG ISO/IEC 10918-1 ITU-T Recommendation T.81) 1994

top

JPEG 2000

Expand this entryGhulam Qadir, Xi Zhao and Anthony T. S Ho
View documentEstimating JPEG2000 compression for image forensics using Benford's law 2010

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentPassive detection of doctored JPEG image via block artifact grid extraction 2009

Expand this entryNicholas Zhong-Yang Ho and Ee-Chien Chang
View documentResidual information of redacted images hidden in the compression artifacts 2008

Expand this entryJin Li
View documentImage Compression: The Mathematics of JPEG 2000 2003

Expand this entryDavid S. Taubman and Michael W. Marcellin
View documentJPEG2000: Image Compression Fundamentals, Standards and Practice 2002

Expand this entryArne Jensen and Anders La Cour-Harbo
View documentRipples in Mathematics: The Discrete Wavelet Transform 2001

top

Natural images

View documentA 3-D photo forensic analysis of the Lee Harvey Oswald Backyard photo 2010

Expand this entryHany Farid and Mary J. Bravo
View documentImage forensic analyses that elude the human visual system 2010

Expand this entryHong Cao and Alex C. Kot
View documentIdentification of recaptured photographs on LCD screens 2010

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentA dft-based analysis to discern between camera and scanned images 2010

Expand this entryPatchara Sutthiwan, Jingyu Ye and Yun Qing Shi
View documentAn enhanced statistical approach to identifying photorealistic images 2009

Expand this entryGopinath Sankar, H. Vicky Zhao and Yee-Hong Yang
View documentFeature based classification of computer graphics and real images 2009

Expand this entryHang Yu, Tian-Tsong Ng and Qibin Sun
View documentRecaptured photo detection using specularity distribution 2008

Expand this entryMicah K. Johnson
View documentLighting and optical tools for image forensics 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries in complex lighting environments 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries through specular highlights on the eye 2007

Expand this entryAhmet E. Dirik, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentNew features to identify computer generated images 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentDetecting photographic composites of people 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries through chromatic aberration 2006

Expand this entrySintayehu Dehnie, Husrev T. Sencar and Nasir D. Memon
View documentIdentification of computer generated and digital camera images for digital image forensics 2006

Expand this entrySiwei Lyu
View documentNatural image statistics for digital image forensics 2005

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries by detecting inconsistencies in lighting 2005

Expand this entrySiwei Lyu and Hany Farid
View documentHow realistic is photorealistic? 2005

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie and Mao-Pei Tsui
View documentPhysics-motivated features for distinguishing photographic images and computer graphics 2005

View documentCreating and detecting doctored and virtual images: implications to the child pornography prevention act 2004

Expand this entryTian-Tsong Ng and Shih-Fu Chang
View documentClassifying photographic and photorealistic computer graphic images using natural image statistics 2004

top

Printers and scanners

Expand this entryGazi N. Ali, Pei-Ju Chiang, Aravind K. Mikkilineni, George T. -C Chiu, Edward J. Delp and Jan P. Allebach
View documentApplication of principal components analysis and gaussian mixture models to printer identification 2004

Expand this entryY. Akao, K. Kobayashi, S. Sugawara and Y. Seki
View documentDiscrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis 2002

top

Processing

View documentOn detection of median filtering in digital images 2010

Expand this entryHany Farid and Alin C. Popescu
View documentBlind removal of image non-linearities 2001

Expand this entryHany Farid and Alin C. Popescu
View documentBlind removal of lens distortion 2001

top

Resampling

Expand this entryToshihiko Yamasaki, Tomoaki Matsunami and Kiyoharu Aizawa
View documentDetecting nonlinearly-resized JPEG images by analyzing high frequency elements in DCT coefficients 2010

Expand this entryLakshmanan Nataraj, Anindya Sarkar and Bangalore S. Manjunath
View documentImproving re-sampling detection by adding noise 2010

View documentLinear row and column predictors for the analysis of resized images 2010

Expand this entryNahuel Dalgaard, Carlos Mosquera and Fernando Perez-Gonzalez
View documentOn the role of differentiation for resampling detection 2010

View documentOn resampling detection in re-compressed images 2009

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection and description of geometrically transformed digital images 2009

Expand this entryAriawan Suwendi and Jan P. Allebach
View documentNearest-neighbor and bilinear resampling factor estimation to detect blockiness or blurriness of an image 2008

Expand this entryWeimin Wei, Shuozhong Wang and Zhenjun Tang
View documentEstimation of rescaling factor and detection of image splicing 2008

View documentHiding traces of resampling in digital images 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection of resampling supplemented with noise inconsistencies analysis for image forensics 2008

View documentFast and reliable resampling detection by spectral analysis of fixed linear predictor residue 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlind authentication using periodic properties of interpolation 2008

View documentOn the detectability of local resampling in digital images 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentOn periodic properties of interpolation and their application to image authentication 2007

Expand this entryS. Prasad and K. R. Ramakrishnan
View documentOn resampling detection and its application to detect image tampering 2006

View documentDetection of linear and cubic interpolation in JPEG compressed images 2005

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries by detecting traces of re-sampling 2005

Expand this entryAlin C. Popescu
View documentStatistical tools for digital image forensics 2005

Expand this entryAlin C. Popescu and Hany Farid
View documentStatistical tools for digital forensics 2004

top

Scanners and printers

Expand this entryChang-Hee Choi, Min-Jeong Lee and Heung-Kyu Lee
View documentScanner identification using spectral noise in the frequency domain 2010

Expand this entryMatthew D. Gaubatz and Steven J. Simske
View documentPrinter-scanner identification via analysis of structured security deterrents 2009

Expand this entryNitin Khanna and Edward J. Delp
View documentSource scanner identification for scanned documents 2009

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentDistinguishing between camera and scanned images by means of frequency analysis 2009

Expand this entryNitin Khanna, Aravind K. Mikkilineni and Edward J. Delp
View documentScanner identification using feature-based processing and analysis 2009

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentIntrinsic sensor noise features for forensic analysis on scanners and scanned images 2009

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentFlatbed scanner identification based on dust and scratches over scanner platen 2009

Expand this entryOrhan Bulan, Junwen Mao and Gaurav Sharma
View documentGeometric distortion signatures for printer identification 2009

Expand this entryWei Deng, Qinghu Chen, Feng Yuan and Yuchen Yan
View documentPrinter identification based on distance transform 2008

View documentPrinter profiling for forensics and ballistics 2008

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification with extension to forgery detection 2008

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification using sensor pattern noise 2007

Expand this entryThomas Gloe, Elke Franz and Antje Winkler
View documentForensics for flatbed scanners 2007

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentRobust scanner identification based on noise features 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

top

Source identification

Expand this entryDaniel Patricio Nicolalde, Apolinário, Jr and. José Antonio
View documentEvaluating digital audio authenticity with spectral distances and ENF phase change 2009

Expand this entryMaarten Huijbregtse and Zeno J. M H. Geradts
View documentUsing the ENF criterion for determining the time of recording of short digital audio recordings 2009

Expand this entryRobert Buchholz, Christian Kraetzer and Jana Dittmann
View documentMicrophone classification using fourier coefficients 2009

Expand this entryMatthew Stamm and K. J. Ray Liu
View documentBlind forensics of contrast enhancement in digital images 2008

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic techniques for classifying scanner, computer generated and digital camera images 2008

Expand this entryChristine McKay, Ashwin Swaminathan, Hongmei Gou and Min Wu
View documentImage acquisition forensics: forensic analysis to identify imaging source 2008

Expand this entryCatalin Grigoras
View documentApplications of ENF criterion in forensic audio, video, computer and telecommunication analysis 2007

Expand this entryChristian Kraetzer, Andrea Oermann, Jana Dittmann and Andreas Lang
View documentDigital audio forensics: a first practical evaluation on microphone and environment classification 2007

View documentBlind inverse gamma correction 2001

top

Splicing

Expand this entryToshihiko Yamasaki, Tomoaki Matsunami and Kiyoharu Aizawa
View documentDetecting nonlinearly-resized JPEG images by analyzing high frequency elements in DCT coefficients 2010

Expand this entryClaude S. Fillion and Gaurav Sharma
View documentDetecting content adaptive scaling of images for forensic applications 2010

Expand this entryQingzhong Liu and Andrew H. Sung
View documentA new approach for JPEG resize and image splicing detection 2009

Expand this entryWei Zhang, Xiaochun Cao, Jiawan Zhang, Jigui Zhu and Ping Wang
View documentDetecting photographic composites using shadows 2009

Expand this entryWei Zhang, Xiaochun Cao, Zhiyong Feng, Jiawan Zhang and Ping Wang
View documentDetecting photographic composites using two-view geometrical constraints 2009

Expand this entryZhenhua Qu, Guoping Qiu and Jiwu Huang
View documentDetect digital image splicing with visual cues 2009

Expand this entryMiroslav Goljan and Jessica Fridrich
View documentCamera identification from cropped and scaled images 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection of resampling supplemented with noise inconsistencies analysis for image forensics 2008

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentImage splicing detection using camera response function consistency and automatic segmentation 2007

Expand this entryWen Chen, Yun Qing Shi and Wei Su
View documentImage splicing detection using 2-D phase congruency and statistical moments of characteristic function 2007

Expand this entryYun Qing Shi, Chunhua Chen and Wen Chen
View documentA natural image model approach to splicing detection 2007

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentDetecting image splicing using geometry invariants and camera characteristics consistency 2006

Expand this entryDongdong Fu, Yun Qing Shi and Wei Su
View documentDetection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition 2006

Expand this entryTian-Tsong Ng, Shih-Fu Chang and Qibin Sun
View documentBlind detection of photomontage using higher order statistics 2004

Expand this entryTian-Tsong Ng and Shih-Fu Chang
View documentA model for image splicing 2004

top

Tamper hiding

View documentHiding traces of resampling in digital images 2008

View documentTamper hiding: defeating image forensics 2007

Expand this entryRyan Harris
View documentArriving at an anti-forensics consensus: examining how to define and control the anti-forensics problem 2006

top

Tampering detection

View documentExact JPEG recompression 2010

Expand this entryAlessia De Rosa, Francesca Uccheddu, Alessandro Piva, Mauro Barni and Andrea Costanzo
View documentExploring image dependencies: a new challenge in image forensics 2010

Expand this entryPin Zhang and Xiangwei Kong
View documentDetecting image tampering using feature fusion 2009

Expand this entrySebastiano Battiato and Giuseppe Messina
View documentDigital forgery estimation into DCT domain: a critical analysis 2009

Expand this entryWei-Hong Chuang, Ashwin Swaminathan and Min Wu
View documentTampering identification using empirical frequency response 2009

Expand this entryGang Cao, Yao Zhao and Rongrong Ni
View documentDetection of image sharpening based on histogram aberration and ringing artifacts 2009

Expand this entryBabak Mahdian and Stanislav Saic
View documentUsing noise inconsistencies for blind image forensics 2009

Expand this entryZhouchen Lin, Junfeng He, Xiaoou Tang and Chi-Keung Tang
View documentFast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis 2009

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentStatistical fusion of multiple cues for image tampering detection 2008

Expand this entryZhen Zhang, Yuan Ren, Xi-Jian Ping, Zhi-Yong He and Shan-Zhong Zhang
View documentA survey on passive-blind image forgery by doctor method detection 2008

Expand this entryMo Chen, Jessica Fridrich, Jan Lukáš and Miroslav Goljan
View documentImaging sensor noise as digital X-ray for revealing forgeries 2007

Expand this entryYagiz Sutcu, Baris Coskun, Husrev T. Sencar and Nasir D. Memon
View documentTamper detection based on regularity of wavelet transform coefficients 2007

Expand this entrySteven Tjoa, W. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentBlock size forensic analysis in digital images 2007

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentNoise features for image tampering detection and steganalysis 2007

Expand this entryBrandon Dybala, Brian Jennings and David Letscher
View documentDetecting filtered cloning in digital images 2007

Expand this entryHongmei Gou
View documentDigital forensics techniques for graphic data 2007

View documentImage tampering identification using blind deconvolution 2006

View documentExposing digital forgeries in scientific images 2006

View documentExposing digital forgeries in video by detecting double MPEG compression 2006

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetecting digital image forgeries using sensor pattern noise 2006

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection 2006

Expand this entrySangwon Lee, David A. Shamma and Bruce Gooch
View documentDetecting false captioning using common sense reasoning 2006

Expand this entryZhouchen Lin, Rongrong Wang, Xiaoou Tang and Heung-Yeung Shum
View documentDetecting doctored images using camera response normality and consistency 2005

Expand this entryAlin C. Popescu
View documentStatistical tools for digital image forensics 2005

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection with binary similarity measures 2005

Expand this entryDun-Yu Hsiao and Soo-Chang Pei
View documentDetecting digital tampering by blur estimation 2005

Expand this entryAlin C. Popescu and Hany Farid
View documentStatistical tools for digital forensics 2004

Expand this entryİsmail Avcıbaş, Sevinç Bayram, Nasir D. Memon, Bülent Sankur and Mahalingam Ramkumar
View documentA classifier design for detecting image manipulation 2004

Expand this entryHany Farid and Siwei Lyu
View documentHigher-order wavelet statistics and their application to digital forensics 2003

View documentDetecting digital forgeries using bispectral analysis 1999

top

Video

Expand this entryJiawan Zhang, Yuting Su and Mingyu Zhang
View documentExposing digital video forgery by ghost shadow artifact 2009

Expand this entryMichihiro Kobayashi, Takahiro Okabe and Yoichi Sato
View documentDetecting video forgeries based on noise characteristics 2009

Expand this entryWiger van Houten and Zeno J. M H. Geradts
View documentUsing sensor noise to identify low resolution compressed videos from youtube 2009

View documentDetecting re-projected video 2008

Expand this entryN. Mondaini, Roberto Caldelli, Alessandro Piva, Mauro Barni and Vito Cappellini
View documentDetection of malevolent changes in digital video for forensic applications 2007

Expand this entryHany Farid and Jeffrey B. Woodward
View documentVideo stabilization and enhancement 2007

View documentExposing digital forgeries in video by detecting duplication 2007

View documentExposing digital forgeries in interlaced and de-interlaced video 2007

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentSource digital camcorder identification using sensor photo response non-uniformity 2007

Expand this entryStefan Thiemert, Huajian Liu, Martin Steinebach and Lucilla Croce-Ferri
View documentJoint forensics and watermarking approach for video authentication 2007

View documentExposing digital forgeries in video by detecting double MPEG compression 2006

Expand this entryKenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentCCD fingerprint method - identification of a video camera from videotaped images 1999

top

Watermarking and steganography

Expand this entryThomás Pevný and Jessica Fridrich
View documentDetection of double-compression in JPEG images for applications in steganography 2008

Expand this entryStefan Thiemert, Huajian Liu, Martin Steinebach and Lucilla Croce-Ferri
View documentJoint forensics and watermarking approach for video authentication 2007

View documentDigital Watermarking and Steganography 2007

Expand this entryW. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentScalable multimedia fingerprinting forensics with side information 2006

Expand this entryH. Vicky Zhao, Min Wu, Z. Jane Wang and K. J. Ray Liu
View documentForensic analysis of nonlinear collusion attacks for multimedia fingerprinting 2005

View documentSoftware detection of currency 2004