Multimedia forensics bibliography

This bibliography includes papers on digital forensics, multimedia security and some related topics. I have omitted papers on information hiding as these are covered by other online databases. You can sort the entries by year, author, category, etc. using the links below. I have included abstracts for papers where available; to view these, click on the expand icon Expand this entry next to the paper's title.

If you have any corrections or can suggest additional papers to include, please email me at the address on my home page. Many thanks to Matthias Kirchner for suggesting some further papers to include.

There are 267 entries.

top

Kiyoharu Aizawa

Expand this entryToshihiko Yamasaki, Tomoaki Matsunami and Kiyoharu Aizawa
View documentDetecting nonlinearly-resized JPEG images by analyzing high frequency elements in DCT coefficients 2010

top

Y. Akao

Expand this entryY. Akao, K. Kobayashi, S. Sugawara and Y. Seki
View documentDiscrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis 2002

top

Gazi N. Ali

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

Expand this entryGazi N. Ali, Pei-Ju Chiang, Aravind K. Mikkilineni, George T. -C Chiu, Edward J. Delp and Jan P. Allebach
View documentApplication of principal components analysis and gaussian mixture models to printer identification 2004

top

Jan P. Allebach

Expand this entryAriawan Suwendi and Jan P. Allebach
View documentNearest-neighbor and bilinear resampling factor estimation to detect blockiness or blurriness of an image 2008

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification with extension to forgery detection 2008

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic techniques for classifying scanner, computer generated and digital camera images 2008

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification using sensor pattern noise 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic classification of imaging sensor types 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

Expand this entryGazi N. Ali, Pei-Ju Chiang, Aravind K. Mikkilineni, George T. -C Chiu, Edward J. Delp and Jan P. Allebach
View documentApplication of principal components analysis and gaussian mixture models to printer identification 2004

top

Erwin J. Alles

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for heavily JPEG compressed low resolution still images 2009

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for heavily JPEG compressed low resolution still images 2009

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for low resolution heavily compressed images 2008

top

Irene Amerini

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentA dft-based analysis to discern between camera and scanned images 2010

Expand this entryIrene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni and Alessandro Piva
View documentEstimate of PRNU noise based on different noise models for source camera identification 2010

Expand this entryIrene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo and Giuseppe Serra
View documentGeometric tampering estimation by means of a SIFT-based forensic analysis 2010

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentDistinguishing between camera and scanned images by means of frequency analysis 2009

top

Apolinário, Jr ,. José Antonio

Expand this entryDaniel Patricio Nicolalde, Apolinário, Jr and. José Antonio
View documentEvaluating digital audio authenticity with spectral distances and ENF phase change 2009

top

Edoardo Ardizzone

Expand this entryEdoardo Ardizzone, Alessandro Bruno and Giuseppe Mazzola
View documentDetecting multiple copies in tampered images 2010

top

İsmail Avcıbaş

Expand this entryGökhan Gül and İsmail Avcıbaş
View documentSource cell phone camera identification based on singular value decomposition 2009

Expand this entryOya Çeliktutan, Bülent Sankur and İsmail Avcıbaş
View documentBlind identification of source cell-phone model 2008

Expand this entryBülent Sankur, Oya Çeliktutan and İsmail Avcıbaş
View documentBlind identification of cellular phone cameras 2007

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection 2006

Expand this entrySevinç Bayram, Husrev T. Sencar, Nasir D. Memon and İsmail Avcıbaş
View documentSource camera identification based on CFA interpolation 2005

Expand this entryOya Çeliktutan, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentSource cell-phone identification 2005

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection with binary similarity measures 2005

Expand this entryİsmail Avcıbaş, Sevinç Bayram, Nasir D. Memon, Bülent Sankur and Mahalingam Ramkumar
View documentA classifier design for detecting image manipulation 2004

top

Lamberto Ballan

Expand this entryIrene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo and Giuseppe Serra
View documentGeometric tampering estimation by means of a SIFT-based forensic analysis 2010

top

Lucas Ballard

Expand this entryCharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose and Gerald M. Masson
View documentSpot me if you can: uncovering spoken phrases in encrypted VoIP conversations 2008

top

Richard G. Baraniuk

Expand this entryRamesh Neelamani, Ricardo L. de Queiroz, Zhigang Fan, Sanjeeb Dash and Richard G. Baraniuk
View documentJPEG compression history estimation for color images 2006

top

Mauro Barni

Expand this entryAlessia De Rosa, Francesca Uccheddu, Alessandro Piva, Mauro Barni and Andrea Costanzo
View documentExploring image dependencies: a new challenge in image forensics 2010

Expand this entryMauro Barni, Andrea Costanzo and Lara Sabatini
View documentIdentification of cut & paste tampering by means of double-JPEG detection and image segmentation 2010

Expand this entryN. Mondaini, Roberto Caldelli, Alessandro Piva, Mauro Barni and Vito Cappellini
View documentDetection of malevolent changes in digital video for forensic applications 2007

top

Sebastiano Battiato

Expand this entrySebastiano Battiato and Giuseppe Messina
View documentDigital forgery estimation into DCT domain: a critical analysis 2009

top

Heinz H. Bauschke

Expand this entryHeinz H. Bauschke, Christopher H. Hamilton, Mason S. Macklem, Justin S. McMichael and Nicholas R. Swart
View documentRecompression of JPEG images by requantization 2003

top

Bryce E. Bayer

Expand this entryBryce E. Bayer
View documentColor imaging array 1976

top

Sevinç Bayram

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentEfficient techniques for sensor fingerprint matching in large image and video databases 2010

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentAn efficient and robust method for detecting copy-move forgery 2009

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentClassification of digital cameras based on demosaicing artifacts 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentAn efficient and robust method for detecting copy-move forgery (poster) 2008

Expand this entryYagiz Sutcu, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on sensor noise based source camera identification 2007

Expand this entryAhmet E. Dirik, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentNew features to identify computer generated images 2007

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on source camera-model identification based on CFA interpolation 2006

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection 2006

Expand this entrySevinç Bayram, Husrev T. Sencar, Nasir D. Memon and İsmail Avcıbaş
View documentSource camera identification based on CFA interpolation 2005

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection with binary similarity measures 2005

Expand this entryİsmail Avcıbaş, Sevinç Bayram, Nasir D. Memon, Bülent Sankur and Mahalingam Ramkumar
View documentA classifier design for detecting image manipulation 2004

top

Jurrien Bijhold

Expand this entryZeno J. M H. Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentMethods for identification of images acquired with digital cameras 2001

top

Alberto Del Bimbo

Expand this entryIrene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo and Giuseppe Serra
View documentGeometric tampering estimation by means of a SIFT-based forensic analysis 2010

top

Herbert L. Blitzer

Expand this entryHerbert L. Blitzer and Jack Jacobia
View documentForensic Digital Imaging and Photography 2002

top

Jeffrey A. Bloom

View documentDigital Watermarking and Steganography 2007

top

Greg J. Bloy

Expand this entryGreg J. Bloy
View documentBlind camera fingerprinting and image clustering 2008

top

Paul Blythe

Expand this entryPaul Blythe and Jessica Fridrich
View documentSecure digital camera 2004

top

Rainer Böhme

View documentThe 'Dresden Image Database' for benchmarking digital image forensics 2010

View documentMultimedia forensics is not computer forensics 2009

View documentSynthesis of color filter array pattern in digital images 2009

View documentHiding traces of resampling in digital images 2008

View documentCan we trust digital image forensics? 2007

View documentTamper hiding: defeating image forensics 2007

top

Karsten Borowka

Expand this entryThomas Gloe, Antje Winkler and Karsten Borowka
View documentEfficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics 2010

Expand this entryThomas Gloe, Karsten Borowka and Antje Winkler
View documentFeature-based camera model identification works in practice: results of a comprehensive evaluation study 2009

top

Mary J. Bravo

Expand this entryHany Farid and Mary J. Bravo
View documentImage forensic analyses that elude the human visual system 2010

top

Alessandro Bruno

Expand this entryEdoardo Ardizzone, Alessandro Bruno and Giuseppe Mazzola
View documentDetecting multiple copies in tampered images 2010

top

Robert Buchholz

Expand this entryRobert Buchholz, Christian Kraetzer and Jana Dittmann
View documentMicrophone classification using fourier coefficients 2009

top

Orhan Bulan

Expand this entryOrhan Bulan, Junwen Mao and Gaurav Sharma
View documentGeometric distortion signatures for printer identification 2009

top

Roberto Caldelli

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentA dft-based analysis to discern between camera and scanned images 2010

Expand this entryIrene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni and Alessandro Piva
View documentEstimate of PRNU noise based on different noise models for source camera identification 2010

Expand this entryIrene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo and Giuseppe Serra
View documentGeometric tampering estimation by means of a SIFT-based forensic analysis 2010

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentDistinguishing between camera and scanned images by means of frequency analysis 2009

Expand this entryN. Mondaini, Roberto Caldelli, Alessandro Piva, Mauro Barni and Vito Cappellini
View documentDetection of malevolent changes in digital video for forensic applications 2007

top

Gang Cao

Expand this entryGang Cao, Yao Zhao and Rongrong Ni
View documentDetection of image sharpening based on histogram aberration and ringing artifacts 2009

top

Hong Cao

Expand this entryHong Cao and Alex C. Kot
View documentIdentification of recaptured photographs on LCD screens 2010

Expand this entryHong Cao and Alex C. Kot
View documentAccurate detection of demosaicing regularity for digital image forensics 2009

top

Xiaochun Cao

Expand this entryWei Zhang, Xiaochun Cao, Jiawan Zhang, Jigui Zhu and Ping Wang
View documentDetecting photographic composites using shadows 2009

Expand this entryWei Zhang, Xiaochun Cao, Zhiyong Feng, Jiawan Zhang and Ping Wang
View documentDetecting photographic composites using two-view geometrical constraints 2009

top

Vito Cappellini

Expand this entryIrene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni and Alessandro Piva
View documentEstimate of PRNU noise based on different noise models for source camera identification 2010

Expand this entryN. Mondaini, Roberto Caldelli, Alessandro Piva, Mauro Barni and Vito Cappellini
View documentDetection of malevolent changes in digital video for forensic applications 2007

top

Oya Çeliktutan

Expand this entryOya Çeliktutan, Bülent Sankur and İsmail Avcıbaş
View documentBlind identification of source cell-phone model 2008

Expand this entryBülent Sankur, Oya Çeliktutan and İsmail Avcıbaş
View documentBlind identification of cellular phone cameras 2007

Expand this entryOya Çeliktutan, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentSource cell-phone identification 2005

top

Ee-Chien Chang

Expand this entryNicholas Zhong-Yang Ho and Ee-Chien Chang
View documentResidual information of redacted images hidden in the compression artifacts 2008

Expand this entryShuiming Ye, Qibin Sun and Ee-Chien Chang
View documentDetecting digital image forgeries by measuring inconsistencies of blocking artifact 2007

top

Shih-Fu Chang

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentStatistical fusion of multiple cues for image tampering detection 2008

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentImage splicing detection using camera response function consistency and automatic segmentation 2007

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Ching-Yung Lin and Qibin Sun
View documentPassive-blind image forensics 2006

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentDetecting image splicing using geometry invariants and camera characteristics consistency 2006

Expand this entryTian-Tsong Ng, Shih-Fu Chang and Mao-Pei Tsui
View documentCamera response function estimation from a single-channel image using differential invariants 2005

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie and Mao-Pei Tsui
View documentPhysics-motivated features for distinguishing photographic images and computer graphics 2005

Expand this entryTian-Tsong Ng, Shih-Fu Chang and Qibin Sun
View documentBlind detection of photomontage using higher order statistics 2004

Expand this entryTian-Tsong Ng and Shih-Fu Chang
View documentA model for image splicing 2004

Expand this entryTian-Tsong Ng and Shih-Fu Chang
View documentClassifying photographic and photorealistic computer graphic images using natural image statistics 2004

top

Chunhua Chen

Expand this entryYun Qing Shi, Chunhua Chen and Wen Chen
View documentA natural image model approach to splicing detection 2007

top

Mo Chen

Expand this entryMiroslav Goljan, Jessica Fridrich and Mo Chen
View documentSensor noise camera identification: countering counter-forensics 2010

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentDetermining image origin and integrity using sensor noise 2008

Expand this entryMo Chen, Jessica Fridrich and Miroslav Goljan
View documentDigital imaging sensor identification (further study) 2007

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentSource digital camcorder identification using sensor photo response non-uniformity 2007

Expand this entryMiroslav Goljan, Mo Chen and Jessica Fridrich
View documentIdentifying common source digital camera from image pairs 2007

Expand this entryMo Chen, Jessica Fridrich, Jan Lukáš and Miroslav Goljan
View documentImaging sensor noise as digital X-ray for revealing forgeries 2007

top

Qinghu Chen

Expand this entryWei Deng, Qinghu Chen, Feng Yuan and Yuchen Yan
View documentPrinter identification based on distance transform 2008

top

Sz-Han Chen

Expand this entrySz-Han Chen and Chiou-Ting Hsu
View documentSource camera identification based on camera gain histogram 2007

top

Tsuhan Chen

Expand this entryAndrew C. Gallagher and Tsuhan Chen
View documentImage authentication by detecting traces of demosaicing 2008

top

Wen Chen

Expand this entryWen Chen, Yun Qing Shi and Wei Su
View documentImage splicing detection using 2-D phase congruency and statistical moments of characteristic function 2007

Expand this entryYun Qing Shi, Chunhua Chen and Wen Chen
View documentA natural image model approach to splicing detection 2007

top

Yi-Lei Chen

Expand this entryYi-Lei Chen and Chiou-Ting Hsu
View documentDetecting doubly compressed images based on quantization noise model and image restoration 2009

Expand this entryYi-Lei Chen and Chiou-Ting Hsu
View documentImage tampering detection by blocking periodicity analysis in JPEG compressed images 2008

top

Pei-Ju Chiang

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

Expand this entryGazi N. Ali, Pei-Ju Chiang, Aravind K. Mikkilineni, George T. -C Chiu, Edward J. Delp and Jan P. Allebach
View documentApplication of principal components analysis and gaussian mixture models to printer identification 2004

top

George T. -C Chiu

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification with extension to forgery detection 2008

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic techniques for classifying scanner, computer generated and digital camera images 2008

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification using sensor pattern noise 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic classification of imaging sensor types 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

Expand this entryGazi N. Ali, Pei-Ju Chiang, Aravind K. Mikkilineni, George T. -C Chiu, Edward J. Delp and Jan P. Allebach
View documentApplication of principal components analysis and gaussian mixture models to printer identification 2004

top

Chang-Hee Choi

Expand this entryChang-Hee Choi, Min-Jeong Lee and Heung-Kyu Lee
View documentScanner identification using spectral noise in the frequency domain 2010

top

Kai San Choi

Expand this entryKai San Choi, Edmund Y. Lam and Kenneth K. Y Wong
View documentSource camera identification using footprints from lens aberration 2006

top

Kai-Sen Chong

Expand this entryTran Van Lanh, Kai-Sen Chong, Sabu Emmanuel and Mohan S. Kankanhalli
View documentA survey on digital camera image forensic methods 2007

top

Wei-Hong Chuang

Expand this entryWei-Hong Chuang, Ashwin Swaminathan and Min Wu
View documentTampering identification using empirical frequency response 2009

top

Baris Coskun

Expand this entryYagiz Sutcu, Baris Coskun, Husrev T. Sencar and Nasir D. Memon
View documentTamper detection based on regularity of wavelet transform coefficients 2007

top

Andrea Costanzo

Expand this entryAlessia De Rosa, Francesca Uccheddu, Alessandro Piva, Mauro Barni and Andrea Costanzo
View documentExploring image dependencies: a new challenge in image forensics 2010

Expand this entryMauro Barni, Andrea Costanzo and Lara Sabatini
View documentIdentification of cut & paste tampering by means of double-JPEG detection and image segmentation 2010

top

Scott E. Coull

Expand this entryCharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose and Gerald M. Masson
View documentSpot me if you can: uncovering spoken phrases in encrypted VoIP conversations 2008

top

Anders La Cour-Harbo

Expand this entryArne Jensen and Anders La Cour-Harbo
View documentRipples in Mathematics: The Discrete Wavelet Transform 2001

top

Ingemar J. Cox

View documentDigital Watermarking and Steganography 2007

top

Lucilla Croce-Ferri

Expand this entryStefan Thiemert, Huajian Liu, Martin Steinebach and Lucilla Croce-Ferri
View documentJoint forensics and watermarking approach for video authentication 2007

top

Nahuel Dalgaard

Expand this entryNahuel Dalgaard, Carlos Mosquera and Fernando Perez-Gonzalez
View documentOn the role of differentiation for resampling detection 2010

top

Sanjeeb Dash

Expand this entryRamesh Neelamani, Ricardo L. de Queiroz, Zhigang Fan, Sanjeeb Dash and Richard G. Baraniuk
View documentJPEG compression history estimation for color images 2006

top

Sintayehu Dehnie

Expand this entrySintayehu Dehnie, Husrev T. Sencar and Nasir D. Memon
View documentIdentification of computer generated and digital camera images for digital image forensics 2006

top

Edward J. Delp

Expand this entryNitin Khanna and Edward J. Delp
View documentSource scanner identification for scanned documents 2009

Expand this entryNitin Khanna, Aravind K. Mikkilineni and Edward J. Delp
View documentScanner identification using feature-based processing and analysis 2009

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification with extension to forgery detection 2008

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic techniques for classifying scanner, computer generated and digital camera images 2008

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification using sensor pattern noise 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic classification of imaging sensor types 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

Expand this entryGazi N. Ali, Pei-Ju Chiang, Aravind K. Mikkilineni, George T. -C Chiu, Edward J. Delp and Jan P. Allebach
View documentApplication of principal components analysis and gaussian mixture models to printer identification 2004

top

Wei Deng

Expand this entryWei Deng, Qinghu Chen, Feng Yuan and Yuchen Yan
View documentPrinter identification based on distance transform 2008

top

Ahmet E. Dirik

Expand this entryYanmei Fang, Ahmet E. Dirik, Xiaoxi Sun and Nasir D. Memon
View documentSource class identification for DSLR and compact cameras 2009

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentFlatbed scanner identification based on dust and scratches over scanner platen 2009

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentDigital single lens reflex camera identification from traces of sensor dust 2008

Expand this entryAhmet E. Dirik, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentNew features to identify computer generated images 2007

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentSource camera identification based on sensor dust characteristics 2007

top

Jana Dittmann

Expand this entryRobert Buchholz, Christian Kraetzer and Jana Dittmann
View documentMicrophone classification using fourier coefficients 2009

Expand this entryChristian Kraetzer, Andrea Oermann, Jana Dittmann and Andreas Lang
View documentDigital audio forensics: a first practical evaluation on microphone and environment classification 2007

top

Jing Dong

Expand this entryWeihong Wang, Jing Dong and Tieniu Tan
View documentA survey of passive image tampering detection 2009

top

Brandon Dybala

Expand this entryBrandon Dybala, Brian Jennings and David Letscher
View documentDetecting filtered cloning in digital images 2007

top

Sabu Emmanuel

Expand this entryTran Van Lanh, Kai-Sen Chong, Sabu Emmanuel and Mohan S. Kankanhalli
View documentA survey on digital camera image forensic methods 2007

Expand this entryLanh Tran Van, Sabu Emmanuel and Mohan S. Kankanhalli
View documentIdentifying source cell phone using chromatic aberration 2007

top

Yanmei Fang

Expand this entryYanmei Fang, Ahmet E. Dirik, Xiaoxi Sun and Nasir D. Memon
View documentSource class identification for DSLR and compact cameras 2009

top

N. Fan

Expand this entryYizhen Huang and N. Fan
View documentLearning from interpolated images using neural networks for digital forensics 2010

top

Zhigang Fan

Expand this entryRamesh Neelamani, Ricardo L. de Queiroz, Zhigang Fan, Sanjeeb Dash and Richard G. Baraniuk
View documentJPEG compression history estimation for color images 2006

Expand this entryZhigang Fan and Ricardo L. de Queiroz
View documentIdentification of bitmap compression history: JPEG detection and quantizer estimation 2003

top

Hany Farid

Expand this entryHafiz Malik and Hany Farid
View documentAudio forensics from acoustic reverberation 2010

View documentA 3-D photo forensic analysis of the Lee Harvey Oswald Backyard photo 2010

Expand this entryHany Farid and Mary J. Bravo
View documentImage forensic analyses that elude the human visual system 2010

View documentA survey of image forgery detection 2009

View documentExposing digital forgeries from JPEG ghosts 2009

View documentDigital image ballistics from JPEG quantization: a followup study 2008

View documentPrinter profiling for forensics and ballistics 2008

View documentDetecting re-projected video 2008

Expand this entryHany Farid and Jeffrey B. Woodward
View documentVideo stabilization and enhancement 2007

View documentExposing digital forgeries in video by detecting duplication 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries in complex lighting environments 2007

View documentExposing digital forgeries in interlaced and de-interlaced video 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries through specular highlights on the eye 2007

View documentDeception: methods, motives, contexts and consequences 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentDetecting photographic composites of people 2007

View documentDigital doctoring: how to tell the real from the fake 2006

View documentDigital image ballistics from JPEG quantization 2006

View documentExposing digital forgeries in scientific images 2006

View documentExposing digital forgeries in video by detecting double MPEG compression 2006

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries through chromatic aberration 2006

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries by detecting inconsistencies in lighting 2005

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries in color filter array interpolated images 2005

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries by detecting traces of re-sampling 2005

Expand this entrySiwei Lyu and Hany Farid
View documentHow realistic is photorealistic? 2005

View documentCreating and detecting doctored and virtual images: implications to the child pornography prevention act 2004

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries by detecting duplicated image regions 2004

Expand this entryAlin C. Popescu and Hany Farid
View documentStatistical tools for digital forensics 2004

Expand this entryHany Farid and Siwei Lyu
View documentHigher-order wavelet statistics and their application to digital forensics 2003

View documentBlind inverse gamma correction 2001

Expand this entryHany Farid and Alin C. Popescu
View documentBlind removal of image non-linearities 2001

Expand this entryHany Farid and Alin C. Popescu
View documentBlind removal of lens distortion 2001

View documentDetecting digital forgeries using bispectral analysis 1999

top

Xiaoying Feng

Expand this entryXiaoying Feng
View documentFLD-based detection of re-compressed speech signals 2010

top

Zhiyong Feng

Expand this entryWei Zhang, Xiaochun Cao, Zhiyong Feng, Jiawan Zhang and Ping Wang
View documentDetecting photographic composites using two-view geometrical constraints 2009

top

Tomáš Filler

Expand this entryMiroslav Goljan, Jessica Fridrich and Tomáš Filler
View documentManaging a large database of camera fingerprints 2010

Expand this entryMiroslav Goljan, Jessica Fridrich and Tomáš Filler
View documentLarge scale test of sensor fingerprint camera identification 2009

Expand this entryTomáš Filler, Jessica Fridrich and Miroslav Goljan
View documentUsing sensor pattern noise for camera model identification 2008

top

Claude S. Fillion

Expand this entryClaude S. Fillion and Gaurav Sharma
View documentDetecting content adaptive scaling of images for forensic applications 2010

top

Elke Franz

Expand this entryThomas Gloe, Elke Franz and Antje Winkler
View documentForensics for flatbed scanners 2007

top

Felix Freiling

View documentMultimedia forensics is not computer forensics 2009

top

Jessica Fridrich

View documentOn detection of median filtering in digital images 2010

Expand this entryMiroslav Goljan, Jessica Fridrich and Mo Chen
View documentSensor noise camera identification: countering counter-forensics 2010

Expand this entryMiroslav Goljan, Jessica Fridrich and Tomáš Filler
View documentManaging a large database of camera fingerprints 2010

View documentDigital image forensics using sensor noise 2009

Expand this entryMiroslav Goljan, Jessica Fridrich and Tomáš Filler
View documentLarge scale test of sensor fingerprint camera identification 2009

Expand this entryTomáš Filler, Jessica Fridrich and Miroslav Goljan
View documentUsing sensor pattern noise for camera model identification 2008

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentDetermining image origin and integrity using sensor noise 2008

Expand this entryThomás Pevný and Jessica Fridrich
View documentDetection of double-compression in JPEG images for applications in steganography 2008

Expand this entryMiroslav Goljan and Jessica Fridrich
View documentCamera identification from cropped and scaled images 2008

Expand this entryMiroslav Goljan, Jessica Fridrich and Jan Lukáš
View documentCamera identification from printed images 2008

Expand this entryMo Chen, Jessica Fridrich and Miroslav Goljan
View documentDigital imaging sensor identification (further study) 2007

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentSource digital camcorder identification using sensor photo response non-uniformity 2007

Expand this entryMiroslav Goljan, Mo Chen and Jessica Fridrich
View documentIdentifying common source digital camera from image pairs 2007

Expand this entryMo Chen, Jessica Fridrich, Jan Lukáš and Miroslav Goljan
View documentImaging sensor noise as digital X-ray for revealing forgeries 2007

View documentDigital Watermarking and Steganography 2007

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDigital camera identification from sensor pattern noise 2006

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetecting digital image forgeries using sensor pattern noise 2006

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetermining digital image origin using sensor imperfections 2005

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDigital `bullet scratches' for images 2005

Expand this entryPaul Blythe and Jessica Fridrich
View documentSecure digital camera 2004

Expand this entryJan Lukáš and Jessica Fridrich
View documentEstimation of primary quantization matrix in double compressed JPEG images 2003

Expand this entryJessica Fridrich, David Soukal and Jan Lukáš
View documentDetection of copy-move forgery in digital images 2003

top

Gary L. Friedman

Expand this entryGary L. Friedman
View documentThe trustworthy digital camera: restoring credibility to the photographic image 1994

top

Dongdong Fu

Expand this entryDongdong Fu, Yun Qing Shi and Wei Su
View documentA generalized Benford's law for JPEG coefficients and its applications in image forensics 2007

Expand this entryDongdong Fu, Yun Qing Shi and Wei Su
View documentDetection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition 2006

top

Andrew C. Gallagher

Expand this entryAndrew C. Gallagher and Tsuhan Chen
View documentImage authentication by detecting traces of demosaicing 2008

View documentDetection of linear and cubic interpolation in JPEG compressed images 2005

top

Shang Gao

Expand this entryGuanshuo Xu, Shang Gao, Yun Qing Shi, RuiMin Hu and Wei Su
View documentCamera-model identification using Markovian transition probability matrix 2009

top

Matthew D. Gaubatz

Expand this entryMatthew D. Gaubatz and Steven J. Simske
View documentPrinter-scanner identification via analysis of structured security deterrents 2009

top

Zeno J. M H. Geradts

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for heavily JPEG compressed low resolution still images 2009

Expand this entryMaarten Huijbregtse and Zeno J. M H. Geradts
View documentUsing the ENF criterion for determining the time of recording of short digital audio recordings 2009

Expand this entryWiger van Houten and Zeno J. M H. Geradts
View documentUsing sensor noise to identify low resolution compressed videos from youtube 2009

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for heavily JPEG compressed low resolution still images 2009

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for low resolution heavily compressed images 2008

Expand this entryZeno J. M H. Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentMethods for identification of images acquired with digital cameras 2001

top

Thomas Gloe

View documentThe 'Dresden Image Database' for benchmarking digital image forensics 2010

Expand this entryThomas Gloe, Antje Winkler and Karsten Borowka
View documentEfficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics 2010

View documentOn resampling detection in re-compressed images 2009

Expand this entryThomas Gloe, Karsten Borowka and Antje Winkler
View documentFeature-based camera model identification works in practice: results of a comprehensive evaluation study 2009

View documentMultimedia forensics is not computer forensics 2009

View documentCan we trust digital image forensics? 2007

Expand this entryThomas Gloe, Elke Franz and Antje Winkler
View documentForensics for flatbed scanners 2007

top

Miroslav Goljan

Expand this entryMiroslav Goljan, Jessica Fridrich and Mo Chen
View documentSensor noise camera identification: countering counter-forensics 2010

Expand this entryMiroslav Goljan, Jessica Fridrich and Tomáš Filler
View documentManaging a large database of camera fingerprints 2010

Expand this entryMiroslav Goljan, Jessica Fridrich and Tomáš Filler
View documentLarge scale test of sensor fingerprint camera identification 2009

Expand this entryTomáš Filler, Jessica Fridrich and Miroslav Goljan
View documentUsing sensor pattern noise for camera model identification 2008

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentDetermining image origin and integrity using sensor noise 2008

Expand this entryMiroslav Goljan and Jessica Fridrich
View documentCamera identification from cropped and scaled images 2008

Expand this entryMiroslav Goljan, Jessica Fridrich and Jan Lukáš
View documentCamera identification from printed images 2008

Expand this entryMo Chen, Jessica Fridrich and Miroslav Goljan
View documentDigital imaging sensor identification (further study) 2007

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentSource digital camcorder identification using sensor photo response non-uniformity 2007

Expand this entryMiroslav Goljan, Mo Chen and Jessica Fridrich
View documentIdentifying common source digital camera from image pairs 2007

Expand this entryMo Chen, Jessica Fridrich, Jan Lukáš and Miroslav Goljan
View documentImaging sensor noise as digital X-ray for revealing forgeries 2007

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDigital camera identification from sensor pattern noise 2006

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetecting digital image forgeries using sensor pattern noise 2006

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetermining digital image origin using sensor imperfections 2005

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDigital `bullet scratches' for images 2005

top

Minglun Gong

Expand this entryAaron Langille and Minglun Gong
View documentAn efficient match-based duplication detection algorithm 2006

top

Bruce Gooch

Expand this entrySangwon Lee, David A. Shamma and Bruce Gooch
View documentDetecting false captioning using common sense reasoning 2006

top

Hongmei Gou

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentIntrinsic sensor noise features for forensic analysis on scanners and scanned images 2009

Expand this entryChristine McKay, Ashwin Swaminathan, Hongmei Gou and Min Wu
View documentImage acquisition forensics: forensic analysis to identify imaging source 2008

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentRobust scanner identification based on noise features 2007

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentNoise features for image tampering detection and steganalysis 2007

Expand this entryHongmei Gou
View documentDigital forensics techniques for graphic data 2007

top

Catalin Grigoras

Expand this entryCatalin Grigoras
View documentApplications of ENF criterion in forensic audio, video, computer and telecommunication analysis 2007

top

Independent JPEG Group

Expand this entryIndependent JPEG Group
View documentIJG JPEG codec 1997

top

Joint Photographic Experts Group

Expand this entryJoint Photographic Experts Group
View documentJPEG Standard (JPEG ISO/IEC 10918-1 ITU-T Recommendation T.81) 1994

top

Gökhan Gül

Expand this entryGökhan Gül and İsmail Avcıbaş
View documentSource cell phone camera identification based on singular value decomposition 2009

top

Christopher H. Hamilton

Expand this entryHeinz H. Bauschke, Christopher H. Hamilton, Mason S. Macklem, Justin S. McMichael and Nicholas R. Swart
View documentRecompression of JPEG images by requantization 2003

top

Ryan Harris

Expand this entryRyan Harris
View documentArriving at an anti-forensics consensus: examining how to define and control the anti-forensics problem 2006

top

Junfeng He

Expand this entryZhouchen Lin, Junfeng He, Xiaoou Tang and Chi-Keung Tang
View documentFast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis 2009

Expand this entryJunfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang
View documentDetecting doctored JPEG-images via DCT coefficient analysis 2006

top

Zhi-Yong He

Expand this entryZhen Zhang, Yuan Ren, Xi-Jian Ping, Zhi-Yong He and Shan-Zhong Zhang
View documentA survey on passive-blind image forgery by doctor method detection 2008

top

Anthony T. S Ho

Expand this entryGhulam Qadir, Xi Zhao and Anthony T. S Ho
View documentEstimating JPEG2000 compression for image forensics using Benford's law 2010

top

Nicholas Zhong-Yang Ho

Expand this entryNicholas Zhong-Yang Ho and Ee-Chien Chang
View documentResidual information of redacted images hidden in the compression artifacts 2008

top

Wiger van Houten

Expand this entryWiger van Houten and Zeno J. M H. Geradts
View documentUsing sensor noise to identify low resolution compressed videos from youtube 2009

top

Dun-Yu Hsiao

Expand this entryDun-Yu Hsiao and Soo-Chang Pei
View documentDetecting digital tampering by blur estimation 2005

top

Chiou-Ting Hsu

Expand this entryYi-Lei Chen and Chiou-Ting Hsu
View documentDetecting doubly compressed images based on quantization noise model and image restoration 2009

Expand this entryYi-Lei Chen and Chiou-Ting Hsu
View documentImage tampering detection by blocking periodicity analysis in JPEG compressed images 2008

Expand this entrySz-Han Chen and Chiou-Ting Hsu
View documentSource camera identification based on camera gain histogram 2007

top

Jessie Hsu

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie and Mao-Pei Tsui
View documentPhysics-motivated features for distinguishing photographic images and computer graphics 2005

top

Yu-Feng Hsu

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentStatistical fusion of multiple cues for image tampering detection 2008

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentImage splicing detection using camera response function consistency and automatic segmentation 2007

Expand this entryYu-Feng Hsu and Shih-Fu Chang
View documentDetecting image splicing using geometry invariants and camera characteristics consistency 2006

top

Jiwu Huang

Expand this entryRui Yang, Yun Qing Shi and Jiwu Huang
View documentDetecting double compression of audio signal 2010

Expand this entryZhenhua Qu, Guoping Qiu and Jiwu Huang
View documentDetect digital image splicing with visual cues 2009

Expand this entryBin Li, Yun Qing Shi and Jiwu Huang
View documentDetecting doubly compressed JPEG images by using mode based first digit features 2008

Expand this entryRui Yang, Zhenhua Qu and Jiwu Huang
View documentDetecting digital audio forgeries by checking frame offsets 2008

Expand this entryZhenhua Qu, Weiqi Luo and Jiwu Huang
View documentA convolutive mixing model for shifted double JPEG compression with application to passive image authentication 2008

Expand this entryWeiqi Luo, Zhenhua Qu, Jiwu Huang and Guoping Qui
View documentA novel method for detecting cropped and recompressed image block 2007

Expand this entryWeiqi Luo, Jiwu Huang and Guoping Qui
View documentRobust detection of region-duplication forgery in digital images 2006

top

Yizhen Huang

Expand this entryYizhen Huang and N. Fan
View documentLearning from interpolated images using neural networks for digital forensics 2010

Expand this entryYizhen Huang and Yangjing Long
View documentDemosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model 2008

Expand this entryYangjing Long and Yizhen Huang
View documentImage based source camera identification using demosaicking 2006

Expand this entryYizhen Huang
View documentCan digital image forgery detection be unevadable? A case study: color filter array interpolation statistical feature recovery 2005

top

Maarten Huijbregtse

Expand this entryMaarten Huijbregtse and Zeno J. M H. Geradts
View documentUsing the ENF criterion for determining the time of recording of short digital audio recordings 2009

top

RuiMin Hu

Expand this entryGuanshuo Xu, Shang Gao, Yun Qing Shi, RuiMin Hu and Wei Su
View documentCamera-model identification using Markovian transition probability matrix 2009

top

Jack Jacobia

Expand this entryHerbert L. Blitzer and Jack Jacobia
View documentForensic Digital Imaging and Photography 2002

top

Brian Jennings

Expand this entryBrandon Dybala, Brian Jennings and David Letscher
View documentDetecting filtered cloning in digital images 2007

top

Arne Jensen

Expand this entryArne Jensen and Anders La Cour-Harbo
View documentRipples in Mathematics: The Discrete Wavelet Transform 2001

top

Micah K. Johnson

Expand this entryMicah K. Johnson
View documentLighting and optical tools for image forensics 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries in complex lighting environments 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries through specular highlights on the eye 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentDetecting photographic composites of people 2007

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries through chromatic aberration 2006

Expand this entryMicah K. Johnson and Hany Farid
View documentExposing digital forgeries by detecting inconsistencies in lighting 2005

top

Ton Kalker

View documentDigital Watermarking and Steganography 2007

top

Xiao-Bing Kang

Expand this entryXiao-Bing Kang and Sheng-Min Wei
View documentIdentifying tampered regions using singular value decomposition in digital image forensics 2008

top

Mohan S. Kankanhalli

Expand this entryTran Van Lanh, Kai-Sen Chong, Sabu Emmanuel and Mohan S. Kankanhalli
View documentA survey on digital camera image forensic methods 2007

Expand this entryLanh Tran Van, Sabu Emmanuel and Mohan S. Kankanhalli
View documentIdentifying source cell phone using chromatic aberration 2007

top

Eric Kee

View documentPrinter profiling for forensics and ballistics 2008

top

Nitin Khanna

Expand this entryNitin Khanna and Edward J. Delp
View documentSource scanner identification for scanned documents 2009

Expand this entryNitin Khanna, Aravind K. Mikkilineni and Edward J. Delp
View documentScanner identification using feature-based processing and analysis 2009

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification with extension to forgery detection 2008

Expand this entryNitin Khanna, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic techniques for classifying scanner, computer generated and digital camera images 2008

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification using sensor pattern noise 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic classification of imaging sensor types 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

top

Mehdi Kharrazi

Expand this entryMehdi Kharrazi, Husrev T. Sencar and Nasir D. Memon
View documentBlind source camera identification 2004

top

Martijn Kieft

Expand this entryZeno J. M H. Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentMethods for identification of images acquired with digital cameras 2001

top

Matthias Kirchner

View documentEfficient estimation of CFA pattern configuration in digital camera images 2010

View documentOn detection of median filtering in digital images 2010

View documentLinear row and column predictors for the analysis of resized images 2010

View documentOn resampling detection in re-compressed images 2009

View documentMultimedia forensics is not computer forensics 2009

View documentSynthesis of color filter array pattern in digital images 2009

View documentHiding traces of resampling in digital images 2008

View documentFast and reliable resampling detection by spectral analysis of fixed linear predictor residue 2008

View documentOn the detectability of local resampling in digital images 2008

View documentCan we trust digital image forensics? 2007

View documentTamper hiding: defeating image forensics 2007

top

Simon Knight

Expand this entrySimon Knight, Simon Moschou and Matthew Sorell
View documentAnalysis of sensor photo response non-uniformity in RAW images 2009

top

K. Kobayashi

Expand this entryY. Akao, K. Kobayashi, S. Sugawara and Y. Seki
View documentDiscrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis 2002

top

Michihiro Kobayashi

Expand this entryMichihiro Kobayashi, Takahiro Okabe and Yoichi Sato
View documentDetecting video forgeries based on noise characteristics 2009

top

Xiangwei Kong

Expand this entryPin Zhang and Xiangwei Kong
View documentDetecting image tampering using feature fusion 2009

Expand this entryBo Wang, Xiangwei Kong and Xingang You
View documentSource camera identification using support vector machines 2009

Expand this entryFanjie Meng, Xiangwei Kong and Xingang You
View documentA new feature-based method for source camera identification 2008

top

Jesse D. Kornblum

Expand this entryJesse D. Kornblum
View documentUsing JPEG quantization tables to identify imagery processed by software 2008

top

Alex C. Kot

Expand this entryHong Cao and Alex C. Kot
View documentIdentification of recaptured photographs on LCD screens 2010

Expand this entryHong Cao and Alex C. Kot
View documentAccurate detection of demosaicing regularity for digital image forensics 2009

top

Christian Kraetzer

Expand this entryRobert Buchholz, Christian Kraetzer and Jana Dittmann
View documentMicrophone classification using fourier coefficients 2009

Expand this entryChristian Kraetzer, Andrea Oermann, Jana Dittmann and Andreas Lang
View documentDigital audio forensics: a first practical evaluation on microphone and environment classification 2007

top

Markus G. Kuhn

View documentExact JPEG recompression 2010

View documentTowards copy-evident JPEG images 2009

View documentExact JPEG recompression and forensics using interval arithmetic (poster/slides) 2008

top

Kenro Kuroki

Expand this entryZeno J. M H. Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentMethods for identification of images acquired with digital cameras 2001

Expand this entryKenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentCCD fingerprint method - identification of a video camera from videotaped images 1999

top

Kenji Kurosawa

Expand this entryZeno J. M H. Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentMethods for identification of images acquired with digital cameras 2001

Expand this entryKenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentCCD fingerprint method - identification of a video camera from videotaped images 1999

top

Cheng-Liang Lai

Expand this entryMin-Jen Tsai, Cheng-Liang Lai and Jung Liu
View documentCamera/mobile phone source identification for digital forensics 2007

top

Edmund Y. Lam

Expand this entryKai San Choi, Edmund Y. Lam and Kenneth K. Y Wong
View documentSource camera identification using footprints from lens aberration 2006

top

Andreas Lang

Expand this entryChristian Kraetzer, Andrea Oermann, Jana Dittmann and Andreas Lang
View documentDigital audio forensics: a first practical evaluation on microphone and environment classification 2007

top

Aaron Langille

Expand this entryAaron Langille and Minglun Gong
View documentAn efficient match-based duplication detection algorithm 2006

top

Tran Van Lanh

Expand this entryTran Van Lanh, Kai-Sen Chong, Sabu Emmanuel and Mohan S. Kankanhalli
View documentA survey on digital camera image forensic methods 2007

top

Heung-Kyu Lee

Expand this entrySeung-Jin Ryu, Min-Jeong Lee and Heung-Kyu Lee
View documentDetection of copy-rotate-move forgery using Zernike moments 2010

Expand this entryChang-Hee Choi, Min-Jeong Lee and Heung-Kyu Lee
View documentScanner identification using spectral noise in the frequency domain 2010

top

Min-Jeong Lee

Expand this entrySeung-Jin Ryu, Min-Jeong Lee and Heung-Kyu Lee
View documentDetection of copy-rotate-move forgery using Zernike moments 2010

Expand this entryChang-Hee Choi, Min-Jeong Lee and Heung-Kyu Lee
View documentScanner identification using spectral noise in the frequency domain 2010

top

Sangwon Lee

Expand this entrySangwon Lee, David A. Shamma and Bruce Gooch
View documentDetecting false captioning using common sense reasoning 2006

top

David Letscher

Expand this entryBrandon Dybala, Brian Jennings and David Letscher
View documentDetecting filtered cloning in digital images 2007

top

Andrew B. Lewis

View documentExact JPEG recompression 2010

View documentTowards copy-evident JPEG images 2009

View documentExact JPEG recompression and forensics using interval arithmetic (poster/slides) 2008

top

Bin Li

Expand this entryBin Li, Yun Qing Shi and Jiwu Huang
View documentDetecting doubly compressed JPEG images by using mode based first digit features 2008

top

Chang-Tsun Li

Expand this entryChang-Tsun Li
View documentDetection of block artifacts for digital forensic analysis 2009

Expand this entryYue Li and Chang-Tsun Li
View documentDecomposed photo response non-uniformity for digital forensic analysis 2009

top

Jin Li

Expand this entryJin Li
View documentImage Compression: The Mathematics of JPEG 2000 2003

top

Ching-Yung Lin

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Ching-Yung Lin and Qibin Sun
View documentPassive-blind image forensics 2006

top

W. Sabrina Lin

Expand this entryMatthew Stamm, Steven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentAnti-forensics of JPEG compression 2010

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentDigital image source coder forensics via intrinsic fingerprints 2009

Expand this entrySteven Tjoa, W. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentBlock size forensic analysis in digital images 2007

Expand this entrySteven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentTransform coder classification for digital image forensics 2007

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentImage source coding forensics via intrinsic fingerprints 2007

Expand this entryW. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentScalable multimedia fingerprinting forensics with side information 2006

top

Zhouchen Lin

Expand this entryZhouchen Lin, Junfeng He, Xiaoou Tang and Chi-Keung Tang
View documentFast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis 2009

Expand this entryJunfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang
View documentDetecting doctored JPEG-images via DCT coefficient analysis 2006

Expand this entryZhouchen Lin, Rongrong Wang, Xiaoou Tang and Heung-Yeung Shum
View documentDetecting doctored images using camera response normality and consistency 2005

top

Huajian Liu

Expand this entryStefan Thiemert, Huajian Liu, Martin Steinebach and Lucilla Croce-Ferri
View documentJoint forensics and watermarking approach for video authentication 2007

top

Jung Liu

Expand this entryMin-Jen Tsai, Cheng-Liang Lai and Jung Liu
View documentCamera/mobile phone source identification for digital forensics 2007

top

K. J. Ray Liu

Expand this entryMatthew Stamm, Steven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentAnti-forensics of JPEG compression 2010

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentDigital image source coder forensics via intrinsic fingerprints 2009

Expand this entryMatthew Stamm and K. J. Ray Liu
View documentBlind forensics of contrast enhancement in digital images 2008

View documentA pattern classification framework for theoretical analysis of component forensics 2008

View documentIntrinsic fingerprints for image authentication and steganalysis 2007

Expand this entrySteven Tjoa, W. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentBlock size forensic analysis in digital images 2007

View documentOptimization of input pattern for semi non-intrusive component forensics of digital cameras 2007

View documentNon-intrusive component forensics of visual sensors using output images 2007

View documentA component estimation framework for information forensics 2007

Expand this entrySteven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentTransform coder classification for digital image forensics 2007

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentImage source coding forensics via intrinsic fingerprints 2007

View documentImage tampering identification using blind deconvolution 2006

View documentNon-intrusive forensic analysis of visual sensors using output images 2006

Expand this entryW. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentScalable multimedia fingerprinting forensics with side information 2006

View documentComponent forensics of digital cameras: a non-intrusive approach 2006

Expand this entryH. Vicky Zhao, Min Wu, Z. Jane Wang and K. J. Ray Liu
View documentForensic analysis of nonlinear collusion attacks for multimedia fingerprinting 2005

top

Qingzhong Liu

Expand this entryQingzhong Liu and Andrew H. Sung
View documentA new approach for JPEG resize and image splicing detection 2009

top

Weihai Li

Expand this entryWeihai Li and Nenghai Yu
View documentRotation robust detection of copy-move forgery 2010

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentPassive detection of doctored JPEG image via block artifact grid extraction 2009

Expand this entryWeihai Li, Nenghai Yu and Yuan Yuan
View documentDoctored JPEG image detection 2008

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentDetecting copy-paste forgery of JPEG image via block artifact grid extraction 2008

top

Yue Li

Expand this entryYue Li and Chang-Tsun Li
View documentDecomposed photo response non-uniformity for digital forensic analysis 2009

top

Yangjing Long

Expand this entryYizhen Huang and Yangjing Long
View documentDemosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model 2008

Expand this entryYangjing Long and Yizhen Huang
View documentImage based source camera identification using demosaicking 2006

top

Government Response to House of Lords

Expand this entryGovernment Response to House of Lords
View documentSelect committee on science and technology eighth report: digital images as evidence (government response) 1998

top

Jan Lukáš

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentDetermining image origin and integrity using sensor noise 2008

Expand this entryMiroslav Goljan, Jessica Fridrich and Jan Lukáš
View documentCamera identification from printed images 2008

Expand this entryMo Chen, Jessica Fridrich, Miroslav Goljan and Jan Lukáš
View documentSource digital camcorder identification using sensor photo response non-uniformity 2007

Expand this entryMo Chen, Jessica Fridrich, Jan Lukáš and Miroslav Goljan
View documentImaging sensor noise as digital X-ray for revealing forgeries 2007

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDigital camera identification from sensor pattern noise 2006

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetecting digital image forgeries using sensor pattern noise 2006

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDetermining digital image origin using sensor imperfections 2005

Expand this entryJan Lukáš, Jessica Fridrich and Miroslav Goljan
View documentDigital `bullet scratches' for images 2005

Expand this entryJan Lukáš and Jessica Fridrich
View documentEstimation of primary quantization matrix in double compressed JPEG images 2003

Expand this entryJessica Fridrich, David Soukal and Jan Lukáš
View documentDetection of copy-move forgery in digital images 2003

top

Weiqi Luo

Expand this entryZhenhua Qu, Weiqi Luo and Jiwu Huang
View documentA convolutive mixing model for shifted double JPEG compression with application to passive image authentication 2008

Expand this entryWeiqi Luo, Zhenhua Qu, Jiwu Huang and Guoping Qui
View documentA novel method for detecting cropped and recompressed image block 2007

Expand this entryWeiqi Luo, Jiwu Huang and Guoping Qui
View documentRobust detection of region-duplication forgery in digital images 2006

top

Siwei Lyu

Expand this entryXunyu Pan and Siwei Lyu
View documentDetecting image region duplication using SIFT features 2010

Expand this entrySiwei Lyu
View documentEstimating vignetting function from a single image for image authentication 2010

Expand this entrySiwei Lyu
View documentNatural image statistics for digital image forensics 2005

Expand this entrySiwei Lyu and Hany Farid
View documentHow realistic is photorealistic? 2005

Expand this entryHany Farid and Siwei Lyu
View documentHigher-order wavelet statistics and their application to digital forensics 2003

top

Mason S. Macklem

Expand this entryHeinz H. Bauschke, Christopher H. Hamilton, Mason S. Macklem, Justin S. McMichael and Nicholas R. Swart
View documentRecompression of JPEG images by requantization 2003

top

Babak Mahdian

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlind methods for detecting image fakery 2010

Expand this entryBabak Mahdian and Stanislav Saic
View documentUsing noise inconsistencies for blind image forensics 2009

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection and description of geometrically transformed digital images 2009

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlinds methods for detecting image fakery 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection of resampling supplemented with noise inconsistencies analysis for image forensics 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlind authentication using periodic properties of interpolation 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection of copy-move forgery using a method based on blur moment invariants 2007

Expand this entryBabak Mahdian and Stanislav Saic
View documentOn periodic properties of interpolation and their application to image authentication 2007

top

Hafiz Malik

Expand this entryHafiz Malik and Hany Farid
View documentAudio forensics from acoustic reverberation 2010

top

Bangalore S. Manjunath

Expand this entryLakshmanan Nataraj, Anindya Sarkar and Bangalore S. Manjunath
View documentImproving re-sampling detection by adding noise 2010

top

Junwen Mao

Expand this entryOrhan Bulan, Junwen Mao and Gaurav Sharma
View documentGeometric distortion signatures for printer identification 2009

top

Michael W. Marcellin

Expand this entryDavid S. Taubman and Michael W. Marcellin
View documentJPEG2000: Image Compression Fundamentals, Standards and Practice 2002

top

Anthony F. Martone

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

top

Gerald M. Masson

Expand this entryCharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose and Gerald M. Masson
View documentSpot me if you can: uncovering spoken phrases in encrypted VoIP conversations 2008

top

Tomoaki Matsunami

Expand this entryToshihiko Yamasaki, Tomoaki Matsunami and Kiyoharu Aizawa
View documentDetecting nonlinearly-resized JPEG images by analyzing high frequency elements in DCT coefficients 2010

top

Giuseppe Mazzola

Expand this entryEdoardo Ardizzone, Alessandro Bruno and Giuseppe Mazzola
View documentDetecting multiple copies in tampered images 2010

top

Christine McKay

Expand this entryChristine McKay, Ashwin Swaminathan, Hongmei Gou and Min Wu
View documentImage acquisition forensics: forensic analysis to identify imaging source 2008

top

Justin S. McMichael

Expand this entryHeinz H. Bauschke, Christopher H. Hamilton, Mason S. Macklem, Justin S. McMichael and Nicholas R. Swart
View documentRecompression of JPEG images by requantization 2003

top

Nasir D. Memon

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentEfficient techniques for sensor fingerprint matching in large image and video databases 2010

Expand this entryYanmei Fang, Ahmet E. Dirik, Xiaoxi Sun and Nasir D. Memon
View documentSource class identification for DSLR and compact cameras 2009

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentFlatbed scanner identification based on dust and scratches over scanner platen 2009

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentAn efficient and robust method for detecting copy-move forgery 2009

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentDigital single lens reflex camera identification from traces of sensor dust 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentClassification of digital cameras based on demosaicing artifacts 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentAn efficient and robust method for detecting copy-move forgery (poster) 2008

Expand this entryHusrev T. Sencar and Nasir D. Memon
View documentOverview of state-of-the-art in digital image forensics, in 'Statistical Science and Interdisciplinary Research' 2008

Expand this entryYagiz Sutcu, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on sensor noise based source camera identification 2007

Expand this entryYagiz Sutcu, Baris Coskun, Husrev T. Sencar and Nasir D. Memon
View documentTamper detection based on regularity of wavelet transform coefficients 2007

Expand this entryAhmet E. Dirik, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentNew features to identify computer generated images 2007

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentSource camera identification based on sensor dust characteristics 2007

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on source camera-model identification based on CFA interpolation 2006

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection 2006

Expand this entrySintayehu Dehnie, Husrev T. Sencar and Nasir D. Memon
View documentIdentification of computer generated and digital camera images for digital image forensics 2006

Expand this entrySevinç Bayram, Husrev T. Sencar, Nasir D. Memon and İsmail Avcıbaş
View documentSource camera identification based on CFA interpolation 2005

Expand this entryOya Çeliktutan, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentSource cell-phone identification 2005

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection with binary similarity measures 2005

Expand this entryMehdi Kharrazi, Husrev T. Sencar and Nasir D. Memon
View documentBlind source camera identification 2004

Expand this entryİsmail Avcıbaş, Sevinç Bayram, Nasir D. Memon, Bülent Sankur and Mahalingam Ramkumar
View documentA classifier design for detecting image manipulation 2004

top

Fanjie Meng

Expand this entryFanjie Meng, Xiangwei Kong and Xingang You
View documentA new feature-based method for source camera identification 2008

top

Giuseppe Messina

Expand this entrySebastiano Battiato and Giuseppe Messina
View documentDigital forgery estimation into DCT domain: a critical analysis 2009

top

Aravind K. Mikkilineni

Expand this entryNitin Khanna, Aravind K. Mikkilineni and Edward J. Delp
View documentScanner identification using feature-based processing and analysis 2009

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentScanner identification using sensor pattern noise 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentForensic classification of imaging sensor types 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentA survey of forensic characterization methods for physical devices 2006

Expand this entryGazi N. Ali, Pei-Ju Chiang, Aravind K. Mikkilineni, George T. -C Chiu, Edward J. Delp and Jan P. Allebach
View documentApplication of principal components analysis and gaussian mixture models to printer identification 2004

top

Matthew L. Miller

View documentDigital Watermarking and Steganography 2007

top

N. Mondaini

Expand this entryN. Mondaini, Roberto Caldelli, Alessandro Piva, Mauro Barni and Vito Cappellini
View documentDetection of malevolent changes in digital video for forensic applications 2007

top

Fabian Monrose

Expand this entryCharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose and Gerald M. Masson
View documentSpot me if you can: uncovering spoken phrases in encrypted VoIP conversations 2008

top

Simon Moschou

Expand this entrySimon Knight, Simon Moschou and Matthew Sorell
View documentAnalysis of sensor photo response non-uniformity in RAW images 2009

top

Carlos Mosquera

Expand this entryNahuel Dalgaard, Carlos Mosquera and Fernando Perez-Gonzalez
View documentOn the role of differentiation for resampling detection 2010

top

Erika Müller

Expand this entryMathias Schlauweg, Torsten Palfner, Dima Pröfrock and Erika Müller
View documentThe Achilles' heel of JPEG-based image authentication 2005

top

Steven J. Murdoch

View documentSoftware detection of currency 2004

top

Lakshmanan Nataraj

Expand this entryLakshmanan Nataraj, Anindya Sarkar and Bangalore S. Manjunath
View documentImproving re-sampling detection by adding noise 2010

top

Ramesh Neelamani

Expand this entryRamesh Neelamani, Ricardo L. de Queiroz, Zhigang Fan, Sanjeeb Dash and Richard G. Baraniuk
View documentJPEG compression history estimation for color images 2006

top

Tian-Tsong Ng

Expand this entryTian-Tsong Ng and Mao-Pei Tsui
View documentCamera response function signature for digital forensics — Part I: Theory and data selection 2009

Expand this entryTian-Tsong Ng
View documentCamera response function signature for digital forensics — Part II: Signature extraction 2009

Expand this entryHang Yu, Tian-Tsong Ng and Qibin Sun
View documentRecaptured photo detection using specularity distribution 2008

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Ching-Yung Lin and Qibin Sun
View documentPassive-blind image forensics 2006

Expand this entryTian-Tsong Ng, Shih-Fu Chang and Mao-Pei Tsui
View documentCamera response function estimation from a single-channel image using differential invariants 2005

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie and Mao-Pei Tsui
View documentPhysics-motivated features for distinguishing photographic images and computer graphics 2005

Expand this entryTian-Tsong Ng, Shih-Fu Chang and Qibin Sun
View documentBlind detection of photomontage using higher order statistics 2004

Expand this entryTian-Tsong Ng and Shih-Fu Chang
View documentA model for image splicing 2004

Expand this entryTian-Tsong Ng and Shih-Fu Chang
View documentClassifying photographic and photorealistic computer graphic images using natural image statistics 2004

top

Daniel Patricio Nicolalde

Expand this entryDaniel Patricio Nicolalde, Apolinário, Jr and. José Antonio
View documentEvaluating digital audio authenticity with spectral distances and ENF phase change 2009

top

Rongrong Ni

Expand this entryGang Cao, Yao Zhao and Rongrong Ni
View documentDetection of image sharpening based on histogram aberration and ringing artifacts 2009

top

Andrea Oermann

Expand this entryChristian Kraetzer, Andrea Oermann, Jana Dittmann and Andreas Lang
View documentDigital audio forensics: a first practical evaluation on microphone and environment classification 2007

top

Takahiro Okabe

Expand this entryMichihiro Kobayashi, Takahiro Okabe and Yoichi Sato
View documentDetecting video forgeries based on noise characteristics 2009

top

Martin S. Oliver

Expand this entryMartin S. Oliver
View documentUsing sensor dirt for toolmark analysis of digital photographs 2008

Expand this entryMartin S. Oliver
View documentOn the probability of a false positive match for digital camera identification based on sensor dirt location 2008

top

Maria V. Oritz

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

top

Torsten Palfner

Expand this entryMathias Schlauweg, Torsten Palfner, Dima Pröfrock and Erika Müller
View documentThe Achilles' heel of JPEG-based image authentication 2005

top

Xunyu Pan

Expand this entryXunyu Pan and Siwei Lyu
View documentDetecting image region duplication using SIFT features 2010

top

Soo-Chang Pei

Expand this entryDun-Yu Hsiao and Soo-Chang Pei
View documentDetecting digital tampering by blur estimation 2005

top

Fernando Perez-Gonzalez

Expand this entryNahuel Dalgaard, Carlos Mosquera and Fernando Perez-Gonzalez
View documentOn the role of differentiation for resampling detection 2010

top

Patrick Perrot

Expand this entryMarie-Charlotte Poilpré, Patrick Perrot and Hugues Talbot
View documentImage tampering detection using Bayer interpolation and JPEG compression 2008

top

Thomás Pevný

Expand this entryThomás Pevný and Jessica Fridrich
View documentDetection of double-compression in JPEG images for applications in steganography 2008

top

Francesco Picchioni

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentA dft-based analysis to discern between camera and scanned images 2010

Expand this entryIrene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni and Alessandro Piva
View documentEstimate of PRNU noise based on different noise models for source camera identification 2010

Expand this entryRoberto Caldelli, Irene Amerini and Francesco Picchioni
View documentDistinguishing between camera and scanned images by means of frequency analysis 2009

top

Xi-Jian Ping

Expand this entryZhen Zhang, Yuan Ren, Xi-Jian Ping, Zhi-Yong He and Shan-Zhong Zhang
View documentA survey on passive-blind image forgery by doctor method detection 2008

top

Alessandro Piva

Expand this entryAlessia De Rosa, Francesca Uccheddu, Alessandro Piva, Mauro Barni and Andrea Costanzo
View documentExploring image dependencies: a new challenge in image forensics 2010

Expand this entryIrene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni and Alessandro Piva
View documentEstimate of PRNU noise based on different noise models for source camera identification 2010

Expand this entryN. Mondaini, Roberto Caldelli, Alessandro Piva, Mauro Barni and Vito Cappellini
View documentDetection of malevolent changes in digital video for forensic applications 2007

top

Marie-Charlotte Poilpré

Expand this entryMarie-Charlotte Poilpré, Patrick Perrot and Hugues Talbot
View documentImage tampering detection using Bayer interpolation and JPEG compression 2008

top

Alin C. Popescu

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries in color filter array interpolated images 2005

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries by detecting traces of re-sampling 2005

Expand this entryAlin C. Popescu
View documentStatistical tools for digital image forensics 2005

Expand this entryAlin C. Popescu and Hany Farid
View documentExposing digital forgeries by detecting duplicated image regions 2004

Expand this entryAlin C. Popescu and Hany Farid
View documentStatistical tools for digital forensics 2004

Expand this entryHany Farid and Alin C. Popescu
View documentBlind removal of image non-linearities 2001

Expand this entryHany Farid and Alin C. Popescu
View documentBlind removal of lens distortion 2001

top

S. Prasad

Expand this entryS. Prasad and K. R. Ramakrishnan
View documentOn resampling detection and its application to detect image tampering 2006

top

Dima Pröfrock

Expand this entryMathias Schlauweg, Torsten Palfner, Dima Pröfrock and Erika Müller
View documentThe Achilles' heel of JPEG-based image authentication 2005

top

Ghulam Qadir

Expand this entryGhulam Qadir, Xi Zhao and Anthony T. S Ho
View documentEstimating JPEG2000 compression for image forensics using Benford's law 2010

top

Guoping Qiu

Expand this entryZhenhua Qu, Guoping Qiu and Jiwu Huang
View documentDetect digital image splicing with visual cues 2009

top

Ricardo L. de Queiroz

Expand this entryRamesh Neelamani, Ricardo L. de Queiroz, Zhigang Fan, Sanjeeb Dash and Richard G. Baraniuk
View documentJPEG compression history estimation for color images 2006

Expand this entryZhigang Fan and Ricardo L. de Queiroz
View documentIdentification of bitmap compression history: JPEG detection and quantizer estimation 2003

top

Guoping Qui

Expand this entryWeiqi Luo, Zhenhua Qu, Jiwu Huang and Guoping Qui
View documentA novel method for detecting cropped and recompressed image block 2007

Expand this entryWeiqi Luo, Jiwu Huang and Guoping Qui
View documentRobust detection of region-duplication forgery in digital images 2006

top

Zhenhua Qu

Expand this entryZhenhua Qu, Guoping Qiu and Jiwu Huang
View documentDetect digital image splicing with visual cues 2009

Expand this entryRui Yang, Zhenhua Qu and Jiwu Huang
View documentDetecting digital audio forgeries by checking frame offsets 2008

Expand this entryZhenhua Qu, Weiqi Luo and Jiwu Huang
View documentA convolutive mixing model for shifted double JPEG compression with application to passive image authentication 2008

Expand this entryWeiqi Luo, Zhenhua Qu, Jiwu Huang and Guoping Qui
View documentA novel method for detecting cropped and recompressed image block 2007

top

K. R. Ramakrishnan

Expand this entryS. Prasad and K. R. Ramakrishnan
View documentOn resampling detection and its application to detect image tampering 2006

top

Mahalingam Ramkumar

Expand this entryİsmail Avcıbaş, Sevinç Bayram, Nasir D. Memon, Bülent Sankur and Mahalingam Ramkumar
View documentA classifier design for detecting image manipulation 2004

top

Yuan Ren

Expand this entryZhen Zhang, Yuan Ren, Xi-Jian Ping, Zhi-Yong He and Shan-Zhong Zhang
View documentA survey on passive-blind image forgery by doctor method detection 2008

top

Alessia De Rosa

Expand this entryAlessia De Rosa, Francesca Uccheddu, Alessandro Piva, Mauro Barni and Andrea Costanzo
View documentExploring image dependencies: a new challenge in image forensics 2010

top

Kurt Rosenfeld

Expand this entryKurt Rosenfeld and Husrev T. Sencar
View documentA study of the robustness of PRNU-based camera identification 2009

top

Seung-Jin Ryu

Expand this entrySeung-Jin Ryu, Min-Jeong Lee and Heung-Kyu Lee
View documentDetection of copy-rotate-move forgery using Zernike moments 2010

top

Lara Sabatini

Expand this entryMauro Barni, Andrea Costanzo and Lara Sabatini
View documentIdentification of cut & paste tampering by means of double-JPEG detection and image segmentation 2010

top

Stanislav Saic

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlind methods for detecting image fakery 2010

Expand this entryBabak Mahdian and Stanislav Saic
View documentUsing noise inconsistencies for blind image forensics 2009

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection and description of geometrically transformed digital images 2009

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlinds methods for detecting image fakery 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection of resampling supplemented with noise inconsistencies analysis for image forensics 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentBlind authentication using periodic properties of interpolation 2008

Expand this entryBabak Mahdian and Stanislav Saic
View documentDetection of copy-move forgery using a method based on blur moment invariants 2007

Expand this entryBabak Mahdian and Stanislav Saic
View documentOn periodic properties of interpolation and their application to image authentication 2007

top

Naoki Saitoh

Expand this entryZeno J. M H. Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentMethods for identification of images acquired with digital cameras 2001

Expand this entryKenji Kurosawa, Kenro Kuroki and Naoki Saitoh
View documentCCD fingerprint method - identification of a video camera from videotaped images 1999

top

Gopinath Sankar

Expand this entryGopinath Sankar, H. Vicky Zhao and Yee-Hong Yang
View documentFeature based classification of computer graphics and real images 2009

top

Bülent Sankur

Expand this entryOya Çeliktutan, Bülent Sankur and İsmail Avcıbaş
View documentBlind identification of source cell-phone model 2008

Expand this entryBülent Sankur, Oya Çeliktutan and İsmail Avcıbaş
View documentBlind identification of cellular phone cameras 2007

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection 2006

Expand this entryOya Çeliktutan, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentSource cell-phone identification 2005

Expand this entrySevinç Bayram, İsmail Avcıbaş, Bülent Sankur and Nasir D. Memon
View documentImage manipulation detection with binary similarity measures 2005

Expand this entryİsmail Avcıbaş, Sevinç Bayram, Nasir D. Memon, Bülent Sankur and Mahalingam Ramkumar
View documentA classifier design for detecting image manipulation 2004

top

Anindya Sarkar

Expand this entryLakshmanan Nataraj, Anindya Sarkar and Bangalore S. Manjunath
View documentImproving re-sampling detection by adding noise 2010

top

Yoichi Sato

Expand this entryMichihiro Kobayashi, Takahiro Okabe and Yoichi Sato
View documentDetecting video forgeries based on noise characteristics 2009

top

Mathias Schlauweg

Expand this entryMathias Schlauweg, Torsten Palfner, Dima Pröfrock and Erika Müller
View documentThe Achilles' heel of JPEG-based image authentication 2005

top

Y. Seki

Expand this entryY. Akao, K. Kobayashi, S. Sugawara and Y. Seki
View documentDiscrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis 2002

top

Husrev T. Sencar

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentEfficient techniques for sensor fingerprint matching in large image and video databases 2010

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentFlatbed scanner identification based on dust and scratches over scanner platen 2009

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentAn efficient and robust method for detecting copy-move forgery 2009

Expand this entryKurt Rosenfeld and Husrev T. Sencar
View documentA study of the robustness of PRNU-based camera identification 2009

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentDigital single lens reflex camera identification from traces of sensor dust 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentClassification of digital cameras based on demosaicing artifacts 2008

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentAn efficient and robust method for detecting copy-move forgery (poster) 2008

Expand this entryHusrev T. Sencar and Nasir D. Memon
View documentOverview of state-of-the-art in digital image forensics, in 'Statistical Science and Interdisciplinary Research' 2008

Expand this entryYagiz Sutcu, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on sensor noise based source camera identification 2007

Expand this entryYagiz Sutcu, Baris Coskun, Husrev T. Sencar and Nasir D. Memon
View documentTamper detection based on regularity of wavelet transform coefficients 2007

Expand this entryAhmet E. Dirik, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentNew features to identify computer generated images 2007

Expand this entryAhmet E. Dirik, Husrev T. Sencar and Nasir D. Memon
View documentSource camera identification based on sensor dust characteristics 2007

Expand this entrySevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on source camera-model identification based on CFA interpolation 2006

Expand this entrySintayehu Dehnie, Husrev T. Sencar and Nasir D. Memon
View documentIdentification of computer generated and digital camera images for digital image forensics 2006

Expand this entrySevinç Bayram, Husrev T. Sencar, Nasir D. Memon and İsmail Avcıbaş
View documentSource camera identification based on CFA interpolation 2005

Expand this entryMehdi Kharrazi, Husrev T. Sencar and Nasir D. Memon
View documentBlind source camera identification 2004

top

Giuseppe Serra

Expand this entryIrene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo and Giuseppe Serra
View documentGeometric tampering estimation by means of a SIFT-based forensic analysis 2010

top

David A. Shamma

Expand this entrySangwon Lee, David A. Shamma and Bruce Gooch
View documentDetecting false captioning using common sense reasoning 2006

top

Gaurav Sharma

Expand this entryClaude S. Fillion and Gaurav Sharma
View documentDetecting content adaptive scaling of images for forensic applications 2010

Expand this entryOrhan Bulan, Junwen Mao and Gaurav Sharma
View documentGeometric distortion signatures for printer identification 2009

top

Yun Qing Shi

Expand this entryRui Yang, Yun Qing Shi and Jiwu Huang
View documentDetecting double compression of audio signal 2010

Expand this entryGuanshuo Xu, Shang Gao, Yun Qing Shi, RuiMin Hu and Wei Su
View documentCamera-model identification using Markovian transition probability matrix 2009

Expand this entryPatchara Sutthiwan, Jingyu Ye and Yun Qing Shi
View documentAn enhanced statistical approach to identifying photorealistic images 2009

Expand this entryBin Li, Yun Qing Shi and Jiwu Huang
View documentDetecting doubly compressed JPEG images by using mode based first digit features 2008

Expand this entryDongdong Fu, Yun Qing Shi and Wei Su
View documentA generalized Benford's law for JPEG coefficients and its applications in image forensics 2007

Expand this entryWen Chen, Yun Qing Shi and Wei Su
View documentImage splicing detection using 2-D phase congruency and statistical moments of characteristic function 2007

Expand this entryYun Qing Shi, Chunhua Chen and Wen Chen
View documentA natural image model approach to splicing detection 2007

Expand this entryDongdong Fu, Yun Qing Shi and Wei Su
View documentDetection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition 2006

top

Heung-Yeung Shum

Expand this entryZhouchen Lin, Rongrong Wang, Xiaoou Tang and Heung-Yeung Shum
View documentDetecting doctored images using camera response normality and consistency 2005

top

Steven J. Simske

Expand this entryMatthew D. Gaubatz and Steven J. Simske
View documentPrinter-scanner identification via analysis of structured security deterrents 2009

top

Matthew Sorell

Expand this entrySimon Knight, Simon Moschou and Matthew Sorell
View documentAnalysis of sensor photo response non-uniformity in RAW images 2009

top

David Soukal

Expand this entryJessica Fridrich, David Soukal and Jan Lukáš
View documentDetection of copy-move forgery in digital images 2003

top

Matthew Stamm

Expand this entryMatthew Stamm, Steven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentAnti-forensics of JPEG compression 2010

Expand this entryMatthew Stamm and K. J. Ray Liu
View documentBlind forensics of contrast enhancement in digital images 2008

top

Martin Steinebach

Expand this entryStefan Thiemert, Huajian Liu, Martin Steinebach and Lucilla Croce-Ferri
View documentJoint forensics and watermarking approach for video authentication 2007

top

S. Sugawara

Expand this entryY. Akao, K. Kobayashi, S. Sugawara and Y. Seki
View documentDiscrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis 2002

top

Sungjoo Suh

Expand this entryNitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Oritz, Sungjoo Suh, George T. -C Chiu, Jan P. Allebach and Edward J. Delp
View documentSensor forensics: printers, cameras and scanners, they never lie 2007

top

Andrew H. Sung

Expand this entryQingzhong Liu and Andrew H. Sung
View documentA new approach for JPEG resize and image splicing detection 2009

top

Qibin Sun

Expand this entryHang Yu, Tian-Tsong Ng and Qibin Sun
View documentRecaptured photo detection using specularity distribution 2008

Expand this entryShuiming Ye, Qibin Sun and Ee-Chien Chang
View documentDetecting digital image forgeries by measuring inconsistencies of blocking artifact 2007

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Ching-Yung Lin and Qibin Sun
View documentPassive-blind image forensics 2006

Expand this entryTian-Tsong Ng, Shih-Fu Chang and Qibin Sun
View documentBlind detection of photomontage using higher order statistics 2004

top

Xiaoxi Sun

Expand this entryYanmei Fang, Ahmet E. Dirik, Xiaoxi Sun and Nasir D. Memon
View documentSource class identification for DSLR and compact cameras 2009

top

Yagiz Sutcu

Expand this entryYagiz Sutcu, Sevinç Bayram, Husrev T. Sencar and Nasir D. Memon
View documentImprovements on sensor noise based source camera identification 2007

Expand this entryYagiz Sutcu, Baris Coskun, Husrev T. Sencar and Nasir D. Memon
View documentTamper detection based on regularity of wavelet transform coefficients 2007

top

Patchara Sutthiwan

Expand this entryPatchara Sutthiwan, Jingyu Ye and Yun Qing Shi
View documentAn enhanced statistical approach to identifying photorealistic images 2009

top

Wei Su

Expand this entryGuanshuo Xu, Shang Gao, Yun Qing Shi, RuiMin Hu and Wei Su
View documentCamera-model identification using Markovian transition probability matrix 2009

Expand this entryDongdong Fu, Yun Qing Shi and Wei Su
View documentA generalized Benford's law for JPEG coefficients and its applications in image forensics 2007

Expand this entryWen Chen, Yun Qing Shi and Wei Su
View documentImage splicing detection using 2-D phase congruency and statistical moments of characteristic function 2007

Expand this entryDongdong Fu, Yun Qing Shi and Wei Su
View documentDetection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition 2006

top

Ariawan Suwendi

Expand this entryAriawan Suwendi and Jan P. Allebach
View documentNearest-neighbor and bilinear resampling factor estimation to detect blockiness or blurriness of an image 2008

top

Yuting Su

Expand this entryJiawan Zhang, Yuting Su and Mingyu Zhang
View documentExposing digital video forgery by ghost shadow artifact 2009

top

Ashwin Swaminathan

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentIntrinsic sensor noise features for forensic analysis on scanners and scanned images 2009

Expand this entryWei-Hong Chuang, Ashwin Swaminathan and Min Wu
View documentTampering identification using empirical frequency response 2009

View documentA pattern classification framework for theoretical analysis of component forensics 2008

Expand this entryChristine McKay, Ashwin Swaminathan, Hongmei Gou and Min Wu
View documentImage acquisition forensics: forensic analysis to identify imaging source 2008

View documentIntrinsic fingerprints for image authentication and steganalysis 2007

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentRobust scanner identification based on noise features 2007

View documentOptimization of input pattern for semi non-intrusive component forensics of digital cameras 2007

View documentNon-intrusive component forensics of visual sensors using output images 2007

View documentA component estimation framework for information forensics 2007

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentNoise features for image tampering detection and steganalysis 2007

View documentImage tampering identification using blind deconvolution 2006

View documentNon-intrusive forensic analysis of visual sensors using output images 2006

View documentComponent forensics of digital cameras: a non-intrusive approach 2006

top

Nicholas R. Swart

Expand this entryHeinz H. Bauschke, Christopher H. Hamilton, Mason S. Macklem, Justin S. McMichael and Nicholas R. Swart
View documentRecompression of JPEG images by requantization 2003

top

Hugues Talbot

Expand this entryMarie-Charlotte Poilpré, Patrick Perrot and Hugues Talbot
View documentImage tampering detection using Bayer interpolation and JPEG compression 2008

top

Chi-Keung Tang

Expand this entryZhouchen Lin, Junfeng He, Xiaoou Tang and Chi-Keung Tang
View documentFast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis 2009

top

Xiaoou Tang

Expand this entryZhouchen Lin, Junfeng He, Xiaoou Tang and Chi-Keung Tang
View documentFast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis 2009

Expand this entryJunfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang
View documentDetecting doctored JPEG-images via DCT coefficient analysis 2006

Expand this entryZhouchen Lin, Rongrong Wang, Xiaoou Tang and Heung-Yeung Shum
View documentDetecting doctored images using camera response normality and consistency 2005

top

Zhenjun Tang

Expand this entryWeimin Wei, Shuozhong Wang and Zhenjun Tang
View documentEstimation of rescaling factor and detection of image splicing 2008

top

Tieniu Tan

Expand this entryWeihong Wang, Jing Dong and Tieniu Tan
View documentA survey of passive image tampering detection 2009

top

David S. Taubman

Expand this entryDavid S. Taubman and Michael W. Marcellin
View documentJPEG2000: Image Compression Fundamentals, Standards and Practice 2002

top

Stefan Thiemert

Expand this entryStefan Thiemert, Huajian Liu, Martin Steinebach and Lucilla Croce-Ferri
View documentJoint forensics and watermarking approach for video authentication 2007

top

Steven Tjoa

Expand this entryMatthew Stamm, Steven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentAnti-forensics of JPEG compression 2010

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentDigital image source coder forensics via intrinsic fingerprints 2009

Expand this entrySteven Tjoa, W. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentBlock size forensic analysis in digital images 2007

Expand this entrySteven Tjoa, W. Sabrina Lin and K. J. Ray Liu
View documentTransform coder classification for digital image forensics 2007

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentImage source coding forensics via intrinsic fingerprints 2007

top

Min-Jen Tsai

Expand this entryMin-Jen Tsai, Cheng-Liang Lai and Jung Liu
View documentCamera/mobile phone source identification for digital forensics 2007

Expand this entryMin-Jen Tsai and Guan-Hui Wu
View documentUsing image features to identify camera sources 2006

top

Mao-Pei Tsui

Expand this entryTian-Tsong Ng and Mao-Pei Tsui
View documentCamera response function signature for digital forensics — Part I: Theory and data selection 2009

Expand this entryTian-Tsong Ng, Shih-Fu Chang and Mao-Pei Tsui
View documentCamera response function estimation from a single-channel image using differential invariants 2005

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie and Mao-Pei Tsui
View documentPhysics-motivated features for distinguishing photographic images and computer graphics 2005

top

Francesca Uccheddu

Expand this entryAlessia De Rosa, Francesca Uccheddu, Alessandro Piva, Mauro Barni and Andrea Costanzo
View documentExploring image dependencies: a new challenge in image forensics 2010

top

Lanh Tran Van

Expand this entryLanh Tran Van, Sabu Emmanuel and Mohan S. Kankanhalli
View documentIdentifying source cell phone using chromatic aberration 2007

top

Cor J. Veenman

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for heavily JPEG compressed low resolution still images 2009

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for heavily JPEG compressed low resolution still images 2009

Expand this entryErwin J. Alles, Zeno J. M H. Geradts and Cor J. Veenman
View documentSource camera identification for low resolution heavily compressed images 2008

top

Bo Wang

Expand this entryBo Wang, Xiangwei Kong and Xingang You
View documentSource camera identification using support vector machines 2009

top

Lifeng Wang

Expand this entryJunfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang
View documentDetecting doctored JPEG-images via DCT coefficient analysis 2006

top

Ping Wang

Expand this entryWei Zhang, Xiaochun Cao, Jiawan Zhang, Jigui Zhu and Ping Wang
View documentDetecting photographic composites using shadows 2009

Expand this entryWei Zhang, Xiaochun Cao, Zhiyong Feng, Jiawan Zhang and Ping Wang
View documentDetecting photographic composites using two-view geometrical constraints 2009

top

Rongrong Wang

Expand this entryZhouchen Lin, Rongrong Wang, Xiaoou Tang and Heung-Yeung Shum
View documentDetecting doctored images using camera response normality and consistency 2005

top

Shuozhong Wang

Expand this entryWeimin Wei, Shuozhong Wang and Zhenjun Tang
View documentEstimation of rescaling factor and detection of image splicing 2008

top

Weihong Wang

Expand this entryWeihong Wang, Jing Dong and Tieniu Tan
View documentA survey of passive image tampering detection 2009

View documentDetecting re-projected video 2008

View documentExposing digital forgeries in video by detecting duplication 2007

View documentExposing digital forgeries in interlaced and de-interlaced video 2007

View documentExposing digital forgeries in video by detecting double MPEG compression 2006

top

Z. Jane Wang

Expand this entryH. Vicky Zhao, Min Wu, Z. Jane Wang and K. J. Ray Liu
View documentForensic analysis of nonlinear collusion attacks for multimedia fingerprinting 2005

top

Sheng-Min Wei

Expand this entryXiao-Bing Kang and Sheng-Min Wei
View documentIdentifying tampered regions using singular value decomposition in digital image forensics 2008

top

Weimin Wei

Expand this entryWeimin Wei, Shuozhong Wang and Zhenjun Tang
View documentEstimation of rescaling factor and detection of image splicing 2008

top

Antje Winkler

Expand this entryThomas Gloe, Antje Winkler and Karsten Borowka
View documentEfficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics 2010

Expand this entryThomas Gloe, Karsten Borowka and Antje Winkler
View documentFeature-based camera model identification works in practice: results of a comprehensive evaluation study 2009

View documentCan we trust digital image forensics? 2007

Expand this entryThomas Gloe, Elke Franz and Antje Winkler
View documentForensics for flatbed scanners 2007

top

Kenneth K. Y Wong

Expand this entryKai San Choi, Edmund Y. Lam and Kenneth K. Y Wong
View documentSource camera identification using footprints from lens aberration 2006

top

Jeffrey B. Woodward

Expand this entryHany Farid and Jeffrey B. Woodward
View documentVideo stabilization and enhancement 2007

top

Charles V. Wright

Expand this entryCharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose and Gerald M. Masson
View documentSpot me if you can: uncovering spoken phrases in encrypted VoIP conversations 2008

top

Guan-Hui Wu

Expand this entryMin-Jen Tsai and Guan-Hui Wu
View documentUsing image features to identify camera sources 2006

top

Min Wu

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentIntrinsic sensor noise features for forensic analysis on scanners and scanned images 2009

Expand this entryWei-Hong Chuang, Ashwin Swaminathan and Min Wu
View documentTampering identification using empirical frequency response 2009

View documentA pattern classification framework for theoretical analysis of component forensics 2008

Expand this entryChristine McKay, Ashwin Swaminathan, Hongmei Gou and Min Wu
View documentImage acquisition forensics: forensic analysis to identify imaging source 2008

View documentIntrinsic fingerprints for image authentication and steganalysis 2007

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentRobust scanner identification based on noise features 2007

View documentOptimization of input pattern for semi non-intrusive component forensics of digital cameras 2007

View documentNon-intrusive component forensics of visual sensors using output images 2007

View documentA component estimation framework for information forensics 2007

Expand this entryHongmei Gou, Ashwin Swaminathan and Min Wu
View documentNoise features for image tampering detection and steganalysis 2007

View documentImage tampering identification using blind deconvolution 2006

View documentNon-intrusive forensic analysis of visual sensors using output images 2006

View documentComponent forensics of digital cameras: a non-intrusive approach 2006

Expand this entryH. Vicky Zhao, Min Wu, Z. Jane Wang and K. J. Ray Liu
View documentForensic analysis of nonlinear collusion attacks for multimedia fingerprinting 2005

top

Lexing Xie

Expand this entryTian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie and Mao-Pei Tsui
View documentPhysics-motivated features for distinguishing photographic images and computer graphics 2005

top

Guanshuo Xu

Expand this entryGuanshuo Xu, Shang Gao, Yun Qing Shi, RuiMin Hu and Wei Su
View documentCamera-model identification using Markovian transition probability matrix 2009

top

Toshihiko Yamasaki

Expand this entryToshihiko Yamasaki, Tomoaki Matsunami and Kiyoharu Aizawa
View documentDetecting nonlinearly-resized JPEG images by analyzing high frequency elements in DCT coefficients 2010

top

Rui Yang

Expand this entryRui Yang, Yun Qing Shi and Jiwu Huang
View documentDetecting double compression of audio signal 2010

Expand this entryRui Yang, Zhenhua Qu and Jiwu Huang
View documentDetecting digital audio forgeries by checking frame offsets 2008

top

Yee-Hong Yang

Expand this entryGopinath Sankar, H. Vicky Zhao and Yee-Hong Yang
View documentFeature based classification of computer graphics and real images 2009

top

Yuchen Yan

Expand this entryWei Deng, Qinghu Chen, Feng Yuan and Yuchen Yan
View documentPrinter identification based on distance transform 2008

top

Jingyu Ye

Expand this entryPatchara Sutthiwan, Jingyu Ye and Yun Qing Shi
View documentAn enhanced statistical approach to identifying photorealistic images 2009

top

Shuiming Ye

Expand this entryShuiming Ye, Qibin Sun and Ee-Chien Chang
View documentDetecting digital image forgeries by measuring inconsistencies of blocking artifact 2007

top

Xingang You

Expand this entryBo Wang, Xiangwei Kong and Xingang You
View documentSource camera identification using support vector machines 2009

Expand this entryFanjie Meng, Xiangwei Kong and Xingang You
View documentA new feature-based method for source camera identification 2008

top

Feng Yuan

Expand this entryWei Deng, Qinghu Chen, Feng Yuan and Yuchen Yan
View documentPrinter identification based on distance transform 2008

top

Yuan Yuan

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentPassive detection of doctored JPEG image via block artifact grid extraction 2009

Expand this entryWeihai Li, Nenghai Yu and Yuan Yuan
View documentDoctored JPEG image detection 2008

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentDetecting copy-paste forgery of JPEG image via block artifact grid extraction 2008

top

Hang Yu

Expand this entryHang Yu, Tian-Tsong Ng and Qibin Sun
View documentRecaptured photo detection using specularity distribution 2008

top

Nenghai Yu

Expand this entryWeihai Li and Nenghai Yu
View documentRotation robust detection of copy-move forgery 2010

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentPassive detection of doctored JPEG image via block artifact grid extraction 2009

Expand this entryWeihai Li, Nenghai Yu and Yuan Yuan
View documentDoctored JPEG image detection 2008

Expand this entryWeihai Li, Yuan Yuan and Nenghai Yu
View documentDetecting copy-paste forgery of JPEG image via block artifact grid extraction 2008

top

Chi Zhang

Expand this entryChi Zhang and Hongbin Zhang
View documentDigital camera identification based on curvelet transform 2009

top

Hongbin Zhang

Expand this entryChi Zhang and Hongbin Zhang
View documentDigital camera identification based on curvelet transform 2009

top

Jiawan Zhang

Expand this entryJiawan Zhang, Yuting Su and Mingyu Zhang
View documentExposing digital video forgery by ghost shadow artifact 2009

Expand this entryWei Zhang, Xiaochun Cao, Jiawan Zhang, Jigui Zhu and Ping Wang
View documentDetecting photographic composites using shadows 2009

Expand this entryWei Zhang, Xiaochun Cao, Zhiyong Feng, Jiawan Zhang and Ping Wang
View documentDetecting photographic composites using two-view geometrical constraints 2009

top

Mingyu Zhang

Expand this entryJiawan Zhang, Yuting Su and Mingyu Zhang
View documentExposing digital video forgery by ghost shadow artifact 2009

top

Pin Zhang

Expand this entryPin Zhang and Xiangwei Kong
View documentDetecting image tampering using feature fusion 2009

top

Shan-Zhong Zhang

Expand this entryZhen Zhang, Yuan Ren, Xi-Jian Ping, Zhi-Yong He and Shan-Zhong Zhang
View documentA survey on passive-blind image forgery by doctor method detection 2008

top

Wei Zhang

Expand this entryWei Zhang, Xiaochun Cao, Jiawan Zhang, Jigui Zhu and Ping Wang
View documentDetecting photographic composites using shadows 2009

Expand this entryWei Zhang, Xiaochun Cao, Zhiyong Feng, Jiawan Zhang and Ping Wang
View documentDetecting photographic composites using two-view geometrical constraints 2009

top

Zhen Zhang

Expand this entryZhen Zhang, Yuan Ren, Xi-Jian Ping, Zhi-Yong He and Shan-Zhong Zhang
View documentA survey on passive-blind image forgery by doctor method detection 2008

top

H. Vicky Zhao

Expand this entryGopinath Sankar, H. Vicky Zhao and Yee-Hong Yang
View documentFeature based classification of computer graphics and real images 2009

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentDigital image source coder forensics via intrinsic fingerprints 2009

Expand this entrySteven Tjoa, W. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentBlock size forensic analysis in digital images 2007

Expand this entryW. Sabrina Lin, Steven Tjoa, H. Vicky Zhao and K. J. Ray Liu
View documentImage source coding forensics via intrinsic fingerprints 2007

Expand this entryW. Sabrina Lin, H. Vicky Zhao and K. J. Ray Liu
View documentScalable multimedia fingerprinting forensics with side information 2006

Expand this entryH. Vicky Zhao, Min Wu, Z. Jane Wang and K. J. Ray Liu
View documentForensic analysis of nonlinear collusion attacks for multimedia fingerprinting 2005

top

Xi Zhao

Expand this entryGhulam Qadir, Xi Zhao and Anthony T. S Ho
View documentEstimating JPEG2000 compression for image forensics using Benford's law 2010

top

Yao Zhao

Expand this entryGang Cao, Yao Zhao and Rongrong Ni
View documentDetection of image sharpening based on histogram aberration and ringing artifacts 2009

top

Jigui Zhu

Expand this entryWei Zhang, Xiaochun Cao, Jiawan Zhang, Jigui Zhu and Ping Wang
View documentDetecting photographic composites using shadows 2009