Tamper Detection

Chapter Contents (Back)
Watermark. Tamper Detection. Image Forensics. Mostly not watermark based tamper detction, but it can be.

Yang, C.K.[Chen-Kuei], Huang, C.S.[Chang-Sheng],
A Novel Watermarking Technique for Tampering Detection in Digital Images,
ELCVIA(3), No. 1, 2004, pp. 1-12.
WWW Version. 0402

Knowles, H.D., Winne, D.A., Canagarajah, C.N., Bull, D.R.,
Image tamper detection and classification using support vector machines,
VISP(151), No. 4, August 2004, pp. 322-328.
IEEE Abstract. 0411

Lin, P.L.[Phen Lan], Hsieh, C.K.[Chung-Kai], Huang, P.W.[Po-Whei],
A hierarchical digital watermarking method for image tamper detection and recovery,
PR(38), No. 12, December 2005, pp. 2519-2529.
WWW Version. 0510

Chang, C.C.[Chin-Chen], Hu, Y.S.[Yih-Shin], Lu, T.C.[Tzu-Chuen],
A watermarking-based image ownership and tampering authentication scheme,
PRL(27), No. 5, 1 April 2006, pp. 439-446.
WWW Version. 0604
Image authentication; Ownership protection; Tampering detection BibRef

Chan, C.S.[Chi-Shiang], Chang, C.C.[Chin-Chen],
An efficient image authentication method based on Hamming code,
PR(40), No. 2, February 2007, pp. 681-690.
WWW Version. 0611
Image authentication; Tamper proofing; Hamming code; Torus automorphism BibRef

Chan, C.S.[Chi-Shiang],
An image authentication method by applying Hamming code on rearranged bits,
PRL(32), No. 14, 15 October 2011, pp. 1679-1690.
Elsevier DOI Link 1110
Image authentication; Tamper proofing; Hamming code BibRef

Yang, H.J.[Hui-Juan], Kot, A.C.[Alex C.],
Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier,
SPLetters(13), No. 12, December 2006, pp. 741-744.
IEEE DOI Link 0701

Chang, C.C.[Chin-Chen], Fan, Y.H.[Yi-Hsuan], Tai, W.L.[Wei-Liang],
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery,
PR(41), No. 2, February 2008, pp. 654-661.
WWW Version. 0711
Fragile watermarking; Image authentication; Tamper detection BibRef

Phan, R.C.W.[Raphael C.W.],
Tampering with a watermarking-based image authentication scheme,
PR(41), No. 11, November 2008, pp. 3493-3496.
WWW Version. 0808
Encoding; Watermarking; Information hiding; Digital rights management; Image authentication; Watermarking; Tampering; Ownership BibRef

Lee, T.Y.[Tien-You], Lin, S.D.[Shinfeng D.],
Dual watermark for image tamper detection and recovery,
PR(41), No. 11, November 2008, pp. 3497-3506.
WWW Version. 0808
Dual watermark; Tamper recovery; Second chance; Partner-block BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
Using noise inconsistencies for blind image forensics,
IVC(27), No. 10, 2 September 2009, pp. 1497-1503.
Elsevier DOI Link 0906
Image forensics; Digital forgery; Image tampering; Image segmentation; Noise inconsistency BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
A bibliography on blind methods for identifying image forgery,
SP:IC(25), No. 6, July 2010, pp. 389-399.
Elsevier DOI Link 1007
Survey, Image Forensics. Image forensics; Digital forgery; Image tampering; Blind forgery detection; Multimedia security BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
A cyclostationarity analysis applied to image forensics,
IEEE DOI Link 0912

Lin, Z.C.[Zhou-Chen], He, J.F.[Jun-Feng], Tang, X.[Xiaoou], Tang, C.K.[Chi-Keung],
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis,
PR(42), No. 11, November 2009, pp. 2492-2501.
Elsevier DOI Link 0907
Pattern analysis; Tampered image detection; JPEG; DCT coefficient; Double quantization BibRef

He, J.F.[Jun-Feng], Lin, Z.C.[Zhou-Chen], Wang, L.F.[Li-Feng], Tang, X.[Xiaoou],
Detecting Doctored JPEG Images Via DCT Coefficient Analysis,
ECCV06(III: 423-435).
Springer DOI Link 0608

Lin, Z.C.[Zhou-Chen], Wang, R.R.[Rong-Rong], Tang, X.[Xiaoou], Shum, H.Y.[Heung-Yeung],
Detecting Doctored Images Using Camera Response Normality and Consistency,
CVPR05(I: 1087-1092).
IEEE DOI Link 0507

Qi, X.J.[Xiao-Jun], Xin, X.[Xing],
A quantization-based semi-fragile watermarking scheme for image content authentication,
JVCIR(22), No. 2, February 2011, pp. 187-200.
Elsevier DOI Link 1102
Authentication measures; Error map; Quantization; Semi-fragile watermarking; Wavelet transform; Tampered error pixels; Tampering detection sensitivity; Localization capability BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing], Chang, R.[Ran],
Image authentication and tamper detection using two complementary watermarks,
IEEE DOI Link 0911

Chuang, J.C.[Jun-Chou], Hu, Y.C.[Yu-Chen],
An adaptive image authentication scheme for vector quantization compressed image,
JVCIR(22), No. 5, July 2011, pp. 440-449.
Elsevier DOI Link 1106
Tamper detection; Image authentication; Watermark; Image compression; Vector quantization; Index table; Random values; Random seed BibRef

Kim, K.S.[Kyung-Su], Lee, M.J.[Min-Jeong], Lee, J.W.[Ji-Won], Oh, T.W.[Tae-Woo], Lee, H.Y.[Hae-Yeoun],
Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging,
CVIU(115), No. 9, September 2011, pp. 1308-1323.
Elsevier DOI Link 1107
Content authentication; Homogeneity analysis; Quad-tree decomposition; Tampering detection; Tampering recovery BibRef

Oh, T.W.[Tae-Woo], Kim, K.S.[Kyung-Su], Lee, H.Y.[Hae-Yeon], Lee, J.W.[Ji-Won], Lee, H.K.[Heung-Kyu],
Enhancing perceptual quality of watermarked high-definition video through composite mask,
IEEE DOI Link 1007

Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
Improved watermark detection robust to camcorder capture based on quadrangle estimation,
IEEE DOI Link 0911

Kim, H.D.[Hee-Dong], Oh, T.W.[Tae-Woo], Lee, J.W.[Ji-Won], Lee, H.K.[Heung-Kyu],
A hybrid watermarking scheme for CCL-applied video contents,
IEEE DOI Link 1110

Oh, T.W.[Tae-Woo], Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Yoon, Y.S.[Young-Suk], Lee, H.K.[Heung-Kyu],
Spatial self-synchronizing video watermarking technique,
IEEE DOI Link 0911

Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Lee, H.Y.[Hae-Yeoun], Oh, T.W.[Tae-Woo], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
Robust watermark detection against D-A/A-D conversion for digital cinema using local auto-correlation function,
IEEE DOI Link 0810

Kim, K.S.[Kyung-Su], Im, D.H.[Dong-Hyuck], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack,
Springer DOI Link 0712

He, Z.W.[Zhong-Wei], Sun, W.[Wei], Lu, W.[Wei], Lu, H.T.[Hong-Tao],
Digital image splicing detection based on approximate run length,
PRL(32), No. 12, 1 September 2011, pp. 1591-1597.
Elsevier DOI Link 1108
Image splicing detection; Digital image forensics; Approximate run length; Edge detection; Characteristic function BibRef

He, Z.W.[Zhong-Wei], Lu, W.[Wei], Sun, W.[Wei],
Improved Run Length Based Detection of Digital Image Splicing,
Springer DOI Link 1208

He, Z.W.[Zhong-Wei], Lu, W.[Wei], Sun, W.[Wei], Huang, J.W.[Ji-Wu],
Digital image splicing detection based on Markov features in DCT and DWT domain,
PR(45), No. 12, December 2012, pp. 4292-4299.
Elsevier DOI Link 1208
Image splicing detection; Digital image forensics; Discrete cosine transform; Discrete wavelet transform; Markov; SVM-RFE BibRef

Feng, X., Cox, I.J., Doerr, G.,
Normalized Energy Density-Based Forensic Detection of Resampled Images,
MultMed(14), No. 3, 2012, pp. 536-545.
IEEE DOI Link 1202

Lee, J.W.[Ji-Won], Lee, M.J.[Min-Jeong], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Screenshot identification by analysis of directional inequality of interlaced video,
JIVP(2012), No. 1 2012, pp. xx-yy.
DOI Link 1202

Wang, X.F.[Xiao-Feng], Xue, J.R.[Jian-Ru], Zheng, Z.Q.[Zhen-Qiang], Liu, Z.L.[Zhen-Li], Li, N.[Ning],
Image forensic signature for content authenticity analysis,
JVCIR(23), No. 5, July 2012, pp. 782-797.
Elsevier DOI Link 1205
Forensic signature; Robust image hash; Content authenticity analysis; Geometric transform estimation; Tampering detection; Tampering localization; Adaptive Harris corner detection; Fisher criterion BibRef

Wang, S.[Shen], Niu, X.[Xiamu],
A Countermeasure against Double Compression Based Image Forensic,
IEICE(E95-D), No. 10, October 2012, pp. 2577-2580.
WWW Version. 1210

Barni, M., Costanzo, A.,
A fuzzy approach to deal with uncertainty in image forensics,
SP:IC(27), No. 9, October 2012, pp. 998-1010.
Elsevier DOI Link 1210
Image forensics; Tampering detection; Fuzzy logic; Data fusion BibRef

Sencar, H.T.[Husrev Taha], Memon, N.[Nasir], (Eds.)
Digital Image Forensics: There is More to a Picture than Meets the Eye,
Springer2013 ISBN 978-1-4614-0756-0 Click to purchase this book
WWW Version. 1211

Memon, N.[Nasir],
Photo Forensics: There Is More to a Picture than Meets the Eye,
Springer DOI Link 1208
And: AVSBS11(3).
IEEE DOI Link 1111
Keynote, summary of ideas. BibRef

Tong, X.J.[Xiao-Jun], Liu, Y.[Yang], Zhang, M.[Miao], Chen, Y.[Yue],
A novel chaos-based fragile watermarking for image tampering detection and self-recovery,
SP:IC(28), No. 3, March 2013, pp. 301-308.
Elsevier DOI Link 1303
Chaos; Image security; Fragile watermarking; Tampering localization; Self-recovery BibRef

Singh, D.[Durgesh], Shivani, S.[Shivendra], Agarwal, S.[Suneeta],
Quantization-Based Fragile Watermarking Using Block-Wise Authentication and Pixel-Wise Recovery Scheme for Tampered Image,
IJIG(13), No. 2, April 2013, pp. 1340002.
DOI Link 1308
Earlier: A2, A1, A3:
DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme,
Springer DOI Link 1307

Chen, C.L.[Cheng-Long], Ni, J.Q.[Jiang-Qun], Huang, J.W.[Ji-Wu],
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach,
IP(22), No. 12, 2013, pp. 4699-4710.
IEEE DOI Link 1312
Earlier: A1, A2, Only:
Median Filtering Detection Using Edge Based Prediction Matrix,
Springer DOI Link 1208
image coding BibRef

Tokuda, E.[Eric], Pedrini, H.[Helio], Rocha, A.[Anderson],
Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach,
JVCIR(24), No. 8, 2013, pp. 1276-1292.
Elsevier DOI Link 1312
Digital forensics BibRef

Ryu, S.J.[Seung-Jin], Lee, H.K.[Heung-Kyu],
Estimation of linear transformation by analyzing the periodicity of interpolation,
PRL(36), No. 1, 2014, pp. 89-99.
Elsevier DOI Link 1312
Image forensics BibRef

Kannammal, A., Rani, S.S.[S. Subha],
Two level security for medical images using watermarking/encryption algorithms,
IJIST(24), No. 1, 2014, pp. 111-120.
DOI Link 1403
digital imaging and communications in medicine BibRef

Ryu, S.J.[Seung-Jin], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Detecting Trace of Seam Carving for Forensic Analysis,
IEICE(E97-D), No. 5, May 2014, pp. 1304-1311.
WWW Version. 1405

Yang, B.[Ben_Juan], Liu, B.[Ben_Yong],
Feature Fusion for Blurring Detection in Image Forensics,
IEICE(E97-D), No. 6, June 2014, pp. 1690-1693.
WWW Version. 1407

Chang, T.Y.[Tang-You], Tai, S.C.[Shen-Chuan], Lin, G.S.[Guo-Shiang],
A passive multi-purpose scheme based on periodicity analysis of CFA artifacts for image forensics,
JVCIR(25), No. 6, 2014, pp. 1289-1298.
Elsevier DOI Link 1407
Image forensics BibRef

Lyu, S.W.[Si-Wei], Pan, X.[Xunyu], Zhang, X.[Xing],
Exposing Region Splicing Forgeries with Blind Local Noise Estimation,
IJCV(110), No. 1, November 2014, pp. 202-221.
WWW Version. 1411
Earlier: A2, A3, A1:
Exposing image splicing with inconsistent local noise variances,
IEEE DOI Link 1208

Ferreira, A.[Anselmo], Rocha, A.[Anderson],
A Multiscale and Multi-Perturbation Blind Forensic Technique for Median Detecting,
Springer DOI Link 1411
Detect that median filtering has been applied. BibRef

Joshi, V.B., Raval, M.S., Mitra, S., Rege, P.P., Parulkar, S.K.,
Reversible watermarking technique to enhance security of a biometric authentication system,
IEEE DOI Link 1408
biometrics (access control) BibRef

Maity, S.P., Maity, H.K.,
M-ary reversible contrast mapping in reversible watermarking with optimal distortion control,
IEEE DOI Link 1408
data encapsulation BibRef

Lalitha, M., Holalad, H., Rajput, S., Muktanidhi, S.D., Mudenagudi, U.,
A classifier framework for the detection of doctored images,
IEEE DOI Link 1408
Bayes methods BibRef

Mall, V., Roy, A.K., Mitra, S.K.,
Digital image tampering detection and localization using singular value decomposition technique,
IEEE DOI Link 1408
cameras BibRef

Ma, P.F.[Peng-Fei], Wang, R.D.[Rang-Ding], Yan, D.Q.[Di-Qun], Jin, C.[Chao],
A Huffman Table Index Based Approach to Detect Double MP3 Compression,
Springer DOI Link 1407

Gao, S.[Shang], Zhang, C.[Cong], Wu, C.L.[Chan-Le], Ye, G.[Gang], Huang, L.[Lei],
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image,
Springer DOI Link 1407

Shen, C.[Chao], Cai, Z.M.[Zhong-Min], Maxion, R.A.[Roy A.], Guan, X.H.[Xiao-Hong],
On User Interaction Behavior as Evidence for Computer Forensic Analysis,
Springer DOI Link 1407

Yang, J.Q.[Jian-Quan], Zhu, G.P.[Guo-Pu], Wang, J.L.[Jun-Long], Shi, Y.Q.[Yun Qing],
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration,
Springer DOI Link 1407

Zhao, X.D.[Xu-Dong], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua], Yuan, Q.Q.[Quan-Qiao],
Image splicing detection based on noncausal Markov model,
IEEE DOI Link 1402
Image splicing detection BibRef

Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando], Liste, N.[Noelia],
Quantization lattice estimation for multimedia forensics,
IEEE DOI Link 1402
Dual lattice; lattice estimation; multimedia forensics; noisy estimation BibRef

Wu, C.M.[Chao-Ming],
Multi-level tamper detection and recovery with tamper type identification,
IEEE DOI Link 1402
adjacent-block based detection BibRef

Conotter, V., Comesana, P., Perez-Gonzalez, F.,
Forensic analysis of full-frame linearly filtered JPEG images,
IEEE DOI Link 1402
JPEG compression;linear filtering BibRef

Bian, S.[Shan], Luo, W.[Weiqi], Huang, J.W.[Ji-Wu],
Exposing fake bitrate video and its original bitrate,
IEEE DOI Link 1402
Digital Video Forensics; Fake Bitrate Video; Video Bitrate Estimation BibRef

Khan, Z.[Zohaib], Shafait, F.[Faisal], Mian, A.[Ajmal],
Hyperspectral Document Imaging: Challenges and Perspectives,
Springer DOI Link 1404
Hyperspectral Imaging for Ink Mismatch Detection,
IEEE DOI Link 1312
document image processing BibRef

Jain, R., Doermann, D.,
VisualDiff: Document Image Verification and Change Detection,
IEEE DOI Link 1312
document image processing BibRef

Tsesmelis, T.[Theodore], Christensen, L.[Lars], Fihl, P.[Preben], Moeslund, T.B.[Thomas B.],
Tamper detection for active surveillance systems,
IEEE DOI Link 1311
Cameras BibRef

García-Ordás, D.[Diego], Fernández-Robles, L.[Laura], Alegre, E.[Enrique], García-Ordás, M.T.[María Teresa],
Automatic Tampering Detection in Spliced Images with Different Compression Levels,
Springer DOI Link 1307

Pollard, S.[Stephen], Simske, S.[Steven], Adams, G.[Guy],
Print biometrics: Recovering forensic signatures from halftone images,
WWW Version. 1302

Li, H.D.[Hao-Dong], Luo, W.Q.[Wei-Qi], Huang, J.W.[Ji-Wu],
Countering anti-JPEG compression forensics,
IEEE DOI Link 1302

Korus, P.[Pawel], Dziech, A.[Andrzej],
Reconfigurable self-embedding with high quality restoration under extensive tampering,
IEEE DOI Link 1302

Maity, S.P.[Santi P.], Delpha, C.[Claude],
Optimal watermark power and host samples allocation under random gain attack,
IEEE DOI Link 1302

Di Crescenzo, G.[Giovanni], Arce, G.[Gonzalo],
Data Forensics Constructions from Cryptographic Hashing and Coding,
Springer DOI Link 1208

Vázquez-Padín, D.[David], Pérez-González, F.[Fernando],
Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces,
Springer DOI Link 1208

Zhang, R.[Rong], Wang, R.D.[Rang-Ding], Ng, T.T.[Tian-Tsong],
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges,
Springer DOI Link 1208

Zhao, X.D.[Xu-Dong], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua], Lin, X.[Xiang],
A Distributed Scheme for Image Splicing Detection,
Springer DOI Link 1407
Earlier: A1, A2, A3, A4, Only:
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection,
Springer DOI Link 1208
Earlier: A1, A4, A3, A2, Only:
Detecting Digital Image Splicing in Chroma Spaces,
Springer DOI Link 1010

Chen, L.[Luyi], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua],
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection,
Springer DOI Link 1208

Zhou, L.N.[Lin-Na], Guo, Y.B.[Yun-Biao], You, X.G.[Xin-Gang],
Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor,
Springer DOI Link 1208

Bateman, P.J.[Philip J.], Ho, A.T.S.[Anthony T. S.], Briffa, J.A.[Johann A.],
Image Forensics of High Dynamic Range Imaging,
Springer DOI Link 1208

Kwok, C.W.[Chun-Wing], Au, O.C., Chui, S.H.[Sung-Him],
Alternative Anti-Forensics Method for Contrast Enhancement,
Springer DOI Link 1208

Chen, L.[Licong], Shi, Y.Q.[Yun Q.], Sutthiwan, P.[Patchara], Niu, X.X.[Xin-Xin],
Non-uniform Quantization in Breaking HUGO,
Springer DOI Link 1407

Sutthiwan, P.[Patchara], Shi, Y.Q.[Yun Q.],
Anti-Forensics of Double JPEG Compression Detection,
Springer DOI Link 1208

Wang, J.X.[Jun-Xiang], Ni, J.Q.[Jiang-Qun], Pan, J.[Jinwei],
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding,
Springer DOI Link 1208

Liu, H.M.[Hong-Mei], Li, L.[Lei], Li, J.[Jian], Huang, J.W.[Ji-Wu],
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates,
Springer DOI Link 1208

Nguyen, H.C.[Hieu Cuong], Katzenbeisser, S.[Stefan],
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images,
Springer DOI Link 1208

Jung, D.J.[Dae-Jin], Hyun, D.K.[Dai-Kyung], Ryu, S.J.[Seung-Jin], Lee, J.W.[Ji-Won], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity,
Springer DOI Link 1208

Wu, R.[Ruoyu], Li, X.L.[Xiao-Long], Yang, B.[Bin],
Identifying computer generated graphics via histogram features,
IEEE DOI Link 1201

Ananya, U, Mudenagudi, U.[Uma],
Detection of doctored images using bispectral analysis,
IEEE DOI Link 1112

Zhu, S.Y.[Shu-Yi], Cao, X.C.[Xiao-Chun], Zhao, H.D.[Han-Dong],
Photographic Composite Detection Using Two Circles,
IEEE DOI Link 1109

Dong, L.[Lisha], Kong, X.W.[Xiang-Wei], Wang, B.[Bo], You, X.[Xin'gang],
Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients,
IEEE DOI Link 1109

Li, L.[Lu], Xue, J.R.[Jian-Ru], Wang, X.F.[Xiao-Feng], Tian, L.[Lihua],
A Robust Approach to Detect Tampering by Exploring Correlation Patterns,
CAIP11(II: 515-522).
Springer DOI Link 1109

Zhao, Y.Q.[Yu Qian], Shih, F.Y.[Frank Y.], Shi, Y.Q.[Yun Q.],
Passive Detection of Paint-Doctored JPEG Images,
Springer DOI Link 1010

Cao, H.[Hong], Kot, A.C.[Alex C.],
Detection of Tampering Inconsistencies on Mobile Photos,
Springer DOI Link 1010

Wang, W.[Wei], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise,
Springer DOI Link 1010

Serra-Ruiz, J., Megias, D.,
DWT and TSVQ-based Semi-fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images,
IEEE DOI Link 1011

Goodwin, J.[Julian], Chetty, G.[Girija],
Blind Video Tamper Detection Based on Fusion of Source Features,
IEEE DOI Link 1205

Chetty, G.[Girija], Goodwin, J.[Julian], Singh, M.[Monica],
Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features,
ACIVS10(II: 79-87).
Springer DOI Link 1012

Stamm, M.C.[Matthew C.], Tjoa, S.K.[Steven K.], Lin, W.S.[W. Sabrina], Liu, K.J.R.[K. J. Ray],
Undetectable image tampering through JPEG compression anti-forensics,
IEEE DOI Link 1009

Wang, W.[Wei], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Image tampering detection based on stationary distribution of Markov chain,
IEEE DOI Link 1009

Ardizzone, E.[Edoardo], Bruno, A.[Alessandro], Mazzola, G.[Giuseppe],
Detecting multiple copies in tampered images,
IEEE DOI Link 1009
See also Visual Saliency by Keypoints Distribution Analysis. BibRef

Yao, X.Z.[Xin-Zhi], Liu, H.M.[Hong-Mei], Rui, W.[Wei], Huang, J.W.[Ji-Wu],
Content-based authentication algorithm for binary images,
IEEE DOI Link 0911
Tamper detection BibRef

Ohkita, K.[Kazuya], Yoshida, M.[Maki], Kitamura, I.[Itaru], Fujiwara, T.[Toru],
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking,
Springer DOI Link 0908

Sutcu, Y., Coskun, B., Sencar, H.T., Memon, N.,
Tamper Detection Based on Regularity of Wavelet Transform Coefficients,
ICIP07(I: 397-400).
IEEE DOI Link 0709

Gou, H.M.[Hong-Mei], Swaminathan, A.[Ashwin], Wu, M.[Min],
Noise Features for Image Tampering Detection and Steganalysis,
ICIP07(VI: 97-100).
IEEE DOI Link 0709

Kihara, M.[Mirei], Fujiyoshi, M.[Masaaki], Wan, Q.T.[Qing Tao], Kiya, H.[Hitoshi],
Image Tamper Detection using Mathematical Morphology,
ICIP07(VI: 101-104).
IEEE DOI Link 0709

Roy, S.[Sujoy], Sun, Q.[Qibin],
Robust Hash for Detecting and Localizing Image Tampering,
ICIP07(VI: 117-120).
IEEE DOI Link 0709

Swaminathan, A., Wu, M.[Min], Liu, K.J.R.,
Image Tampering Identification using Blind Deconvolution,
IEEE DOI Link 0610

Wu, Y.D.[Yong-Dong],
Tamper-Localization Watermarking with Systematic Error Correcting Code,
IEEE DOI Link 0610

Liu, Y., Boncelet, C.G.[Charles G.],
The Crc-Ntmac for Image Tamper Proofing and Authentication,
IEEE DOI Link 0610

Boncelet, C.G.,
Image Authentication and Tamperproofing for Noisy Channels,
ICIP05(I: 677-680).
IEEE DOI Link 0512

Watanabe, J.[Jun], Hasegawa, M., Kato, S.,
A study on a watermarking method for both copyright protection and tamper detection,
ICIP04(IV: 2155-2158).
IEEE DOI Link 0505

Wu, J.H.[Jin-Hai], Zhu, B.B., Li, S.P.[Shi-Peng], Lin, F.[Fuzong],
A secure image authentication algorithm with pixel-level tamper localization,
ICIP04(III: 1573-1576).
IEEE DOI Link 0505

Inoue, H.,
Wavelet-based Watermarking for Tamper Proofing of Still Images,
ICIP00(Vol II: 88-91).
IEEE DOI Link 0008

Fridrich, J.,
Image watermarking for tamper detection,
ICIP98(II: 404-408).
IEEE DOI Link 9810

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Source Camera Identification .

Last update:Nov 25, 2014 at 19:37:27