23.3.9.1 Tamper Detection

Chapter Contents (Back)
Watermark. Tamper Detection. Image Forensics. Mostly not watermark based tamper detction, but it can be.

Yang, C.K.[Chen-Kuei], Huang, C.S.[Chang-Sheng],
A Novel Watermarking Technique for Tampering Detection in Digital Images,
ELCVIA(3), No. 1, 2004, pp. 1-12.
WWW Version. 0402
BibRef

Knowles, H.D., Winne, D.A., Canagarajah, C.N., Bull, D.R.,
Image tamper detection and classification using support vector machines,
VISP(151), No. 4, August 2004, pp. 322-328.
IEEE Abstract. 0411
BibRef

Lin, P.L.[Phen Lan], Hsieh, C.K.[Chung-Kai], Huang, P.W.[Po-Whei],
A hierarchical digital watermarking method for image tamper detection and recovery,
PR(38), No. 12, December 2005, pp. 2519-2529.
WWW Version. 0510
BibRef

Chang, C.C.[Chin-Chen], Hu, Y.S.[Yih-Shin], Lu, T.C.[Tzu-Chuen],
A watermarking-based image ownership and tampering authentication scheme,
PRL(27), No. 5, 1 April 2006, pp. 439-446.
WWW Version. 0604
Image authentication; Ownership protection; Tampering detection BibRef

Chan, C.S.[Chi-Shiang], Chang, C.C.[Chin-Chen],
An efficient image authentication method based on Hamming code,
PR(40), No. 2, February 2007, pp. 681-690.
WWW Version. 0611
Image authentication; Tamper proofing; Hamming code; Torus automorphism BibRef

Chan, C.S.[Chi-Shiang],
An image authentication method by applying Hamming code on rearranged bits,
PRL(32), No. 14, 15 October 2011, pp. 1679-1690.
Elsevier DOI Link 1110
Image authentication; Tamper proofing; Hamming code BibRef

Yang, H.J.[Hui-Juan], Kot, A.C.[Alex C.],
Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier,
SPLetters(13), No. 12, December 2006, pp. 741-744.
IEEE DOI Link 0701
BibRef

Chang, C.C.[Chin-Chen], Fan, Y.H.[Yi-Hsuan], Tai, W.L.[Wei-Liang],
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery,
PR(41), No. 2, February 2008, pp. 654-661.
WWW Version. 0711
Fragile watermarking; Image authentication; Tamper detection BibRef

Phan, R.C.W.[Raphael C.W.],
Tampering with a watermarking-based image authentication scheme,
PR(41), No. 11, November 2008, pp. 3493-3496.
WWW Version. 0808
Encoding; Watermarking; Information hiding; Digital rights management; Image authentication; Watermarking; Tampering; Ownership BibRef

Lee, T.Y.[Tien-You], Lin, S.D.[Shinfeng D.],
Dual watermark for image tamper detection and recovery,
PR(41), No. 11, November 2008, pp. 3497-3506.
WWW Version. 0808
Dual watermark; Tamper recovery; Second chance; Partner-block BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
Using noise inconsistencies for blind image forensics,
IVC(27), No. 10, 2 September 2009, pp. 1497-1503.
Elsevier DOI Link 0906
Image forensics; Digital forgery; Image tampering; Image segmentation; Noise inconsistency BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
A bibliography on blind methods for identifying image forgery,
SP:IC(25), No. 6, July 2010, pp. 389-399.
Elsevier DOI Link 1007
Survey, Image Forensics. Image forensics; Digital forgery; Image tampering; Blind forgery detection; Multimedia security BibRef

Mahdian, B.[Babak], Saic, S.[Stanislav],
A cyclostationarity analysis applied to image forensics,
WACV09(1-6).
IEEE DOI Link 0912
BibRef

Lin, Z.C.[Zhou-Chen], He, J.F.[Jun-Feng], Tang, X.[Xiaoou], Tang, C.K.[Chi-Keung],
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis,
PR(42), No. 11, November 2009, pp. 2492-2501.
Elsevier DOI Link 0907
Pattern analysis; Tampered image detection; JPEG; DCT coefficient; Double quantization BibRef

He, J.F.[Jun-Feng], Lin, Z.C.[Zhou-Chen], Wang, L.F.[Li-Feng], Tang, X.[Xiaoou],
Detecting Doctored JPEG Images Via DCT Coefficient Analysis,
ECCV06(III: 423-435).
Springer DOI Link 0608
BibRef

Lin, Z.C.[Zhou-Chen], Wang, R.R.[Rong-Rong], Tang, X.[Xiaoou], Shum, H.Y.[Heung-Yeung],
Detecting Doctored Images Using Camera Response Normality and Consistency,
CVPR05(I: 1087-1092).
IEEE DOI Link 0507
BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing],
A quantization-based semi-fragile watermarking scheme for image content authentication,
JVCIR(22), No. 2, February 2011, pp. 187-200.
Elsevier DOI Link 1102
Authentication measures; Error map; Quantization; Semi-fragile watermarking; Wavelet transform; Tampered error pixels; Tampering detection sensitivity; Localization capability BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing], Chang, R.[Ran],
Image authentication and tamper detection using two complementary watermarks,
ICIP09(4257-4260).
IEEE DOI Link 0911
BibRef

Chuang, J.C.[Jun-Chou], Hu, Y.C.[Yu-Chen],
An adaptive image authentication scheme for vector quantization compressed image,
JVCIR(22), No. 5, July 2011, pp. 440-449.
Elsevier DOI Link 1106
Tamper detection; Image authentication; Watermark; Image compression; Vector quantization; Index table; Random values; Random seed BibRef

Kim, K.S.[Kyung-Su], Lee, M.J.[Min-Jeong], Lee, J.W.[Ji-Won], Oh, T.W.[Tae-Woo], Lee, H.Y.[Hae-Yeoun],
Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging,
CVIU(115), No. 9, September 2011, pp. 1308-1323.
Elsevier DOI Link 1107
Content authentication; Homogeneity analysis; Quad-tree decomposition; Tampering detection; Tampering recovery BibRef

Oh, T.W.[Tae-Woo], Kim, K.S.[Kyung-Su], Lee, H.Y.[Hae-Yeon], Lee, J.W.[Ji-Won], Lee, H.K.[Heung-Kyu],
Enhancing perceptual quality of watermarked high-definition video through composite mask,
IPTA10(161-165).
IEEE DOI Link 1007
BibRef

Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
Improved watermark detection robust to camcorder capture based on quadrangle estimation,
ICIP09(101-104).
IEEE DOI Link 0911
BibRef

Kim, H.D.[Hee-Dong], Oh, T.W.[Tae-Woo], Lee, J.W.[Ji-Won], Lee, H.K.[Heung-Kyu],
A hybrid watermarking scheme for CCL-applied video contents,
EUVIP11(199-204).
IEEE DOI Link 1110
BibRef

Oh, T.W.[Tae-Woo], Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Yoon, Y.S.[Young-Suk], Lee, H.K.[Heung-Kyu],
Spatial self-synchronizing video watermarking technique,
ICIP09(4233-4236).
IEEE DOI Link 0911
BibRef

Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Lee, H.Y.[Hae-Yeoun], Oh, T.W.[Tae-Woo], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
Robust watermark detection against D-A/A-D conversion for digital cinema using local auto-correlation function,
ICIP08(425-428).
IEEE DOI Link 0810
BibRef

Kim, K.S.[Kyung-Su], Im, D.H.[Dong-Hyuck], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack,
DW07(323-334).
Springer DOI Link 0712
BibRef

He, Z.W.[Zhong-Wei], Sun, W.[Wei], Lu, W.[Wei], Lu, H.T.[Hong-Tao],
Digital image splicing detection based on approximate run length,
PRL(32), No. 12, 1 September 2011, pp. 1591-1597.
Elsevier DOI Link 1108
Image splicing detection; Digital image forensics; Approximate run length; Edge detection; Characteristic function BibRef

He, Z.W.[Zhong-Wei], Lu, W.[Wei], Sun, W.[Wei],
Improved Run Length Based Detection of Digital Image Splicing,
IWDW11(349-360).
Springer DOI Link 1208
BibRef

He, Z.W.[Zhong-Wei], Lu, W.[Wei], Sun, W.[Wei], Huang, J.W.[Ji-Wu],
Digital image splicing detection based on Markov features in DCT and DWT domain,
PR(45), No. 12, December 2012, pp. 4292-4299.
Elsevier DOI Link 1208
Image splicing detection; Digital image forensics; Discrete cosine transform; Discrete wavelet transform; Markov; SVM-RFE BibRef

Feng, X., Cox, I.J., Doerr, G.,
Normalized Energy Density-Based Forensic Detection of Resampled Images,
MultMed(14), No. 3, 2012, pp. 536-545.
IEEE DOI Link 1202
BibRef

Lee, J.W.[Ji-Won], Lee, M.J.[Min-Jeong], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Screenshot identification by analysis of directional inequality of interlaced video,
JIVP(2012), No. 1 2012, pp. xx-yy.
DOI Link 1202
BibRef

Wang, X.F.[Xiao-Feng], Xue, J.R.[Jian-Ru], Zheng, Z.Q.[Zhen-Qiang], Liu, Z.L.[Zhen-Li], Li, N.[Ning],
Image forensic signature for content authenticity analysis,
JVCIR(23), No. 5, July 2012, pp. 782-797.
Elsevier DOI Link 1205
Forensic signature; Robust image hash; Content authenticity analysis; Geometric transform estimation; Tampering detection; Tampering localization; Adaptive Harris corner detection; Fisher criterion BibRef

Wang, S.[Shen], Niu, X.[Xiamu],
A Countermeasure against Double Compression Based Image Forensic,
IEICE(E95-D), No. 10, October 2012, pp. 2577-2580.
WWW Version. 1210
BibRef

Barni, M., Costanzo, A.,
A fuzzy approach to deal with uncertainty in image forensics,
SP:IC(27), No. 9, October 2012, pp. 998-1010.
Elsevier DOI Link 1210
Image forensics; Tampering detection; Fuzzy logic; Data fusion BibRef

Sencar, H.T.[Husrev Taha], Memon, N.[Nasir], (Eds.)
Digital Image Forensics: There is More to a Picture than Meets the Eye,
Springer2013 ISBN 978-1-4614-0756-0 Click to purchase this book
WWW Version. 1211
BibRef

Memon, N.[Nasir],
Photo Forensics: There Is More to a Picture than Meets the Eye,
IWDW11(2).
Springer DOI Link 1208
BibRef
And: AVSBS11(3).
IEEE DOI Link 1111
Keynote, summary of ideas. BibRef

Tong, X.J.[Xiao-Jun], Liu, Y.[Yang], Zhang, M.[Miao], Chen, Y.[Yue],
A novel chaos-based fragile watermarking for image tampering detection and self-recovery,
SP:IC(28), No. 3, March 2013, pp. 301-308.
Elsevier DOI Link 1303
Chaos; Image security; Fragile watermarking; Tampering localization; Self-recovery BibRef

Singh, D.[Durgesh], Shivani, S.[Shivendra], Agarwal, S.[Suneeta],
Quantization-Based Fragile Watermarking Using Block-Wise Authentication and Pixel-Wise Recovery Scheme for Tampered Image,
IJIG(13), No. 2, April 2013, pp. 1340002.
DOI Link 1308
BibRef
Earlier: A2, A1, A3:
DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme,
IbPRIA13(640-647).
Springer DOI Link 1307
BibRef

Chen, C.L.[Cheng-Long], Ni, J.Q.[Jiang-Qun], Huang, J.W.[Ji-Wu],
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach,
IP(22), No. 12, 2013, pp. 4699-4710.
IEEE DOI Link 1312
BibRef
Earlier: A1, A2, Only:
Median Filtering Detection Using Edge Based Prediction Matrix,
IWDW11(361-375).
Springer DOI Link 1208
image coding BibRef

Tokuda, E.[Eric], Pedrini, H.[Helio], Rocha, A.[Anderson],
Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach,
JVCIR(24), No. 8, 2013, pp. 1276-1292.
Elsevier DOI Link 1312
Digital forensics BibRef

Ryu, S.J.[Seung-Jin], Lee, H.K.[Heung-Kyu],
Estimation of linear transformation by analyzing the periodicity of interpolation,
PRL(36), No. 1, 2014, pp. 89-99.
Elsevier DOI Link 1312
Image forensics BibRef

Kannammal, A., Rani, S.S.[S. Subha],
Two level security for medical images using watermarking/encryption algorithms,
IJIST(24), No. 1, 2014, pp. 111-120.
DOI Link 1403
digital imaging and communications in medicine BibRef

Ryu, S.J.[Seung-Jin], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Detecting Trace of Seam Carving for Forensic Analysis,
IEICE(E97-D), No. 5, May 2014, pp. 1304-1311.
WWW Version. 1405
BibRef

Yang, B.[Ben_Juan], Liu, B.[Ben_Yong],
Feature Fusion for Blurring Detection in Image Forensics,
IEICE(E97-D), No. 6, June 2014, pp. 1690-1693.
WWW Version. 1407
BibRef

Chang, T.Y.[Tang-You], Tai, S.C.[Shen-Chuan], Lin, G.S.[Guo-Shiang],
A passive multi-purpose scheme based on periodicity analysis of CFA artifacts for image forensics,
JVCIR(25), No. 6, 2014, pp. 1289-1298.
Elsevier DOI Link 1407
Image forensics BibRef


Joshi, V.B., Raval, M.S., Mitra, S., Rege, P.P., Parulkar, S.K.,
Reversible watermarking technique to enhance security of a biometric authentication system,
NCVPRIPG13(1-4)
IEEE DOI Link 1408
biometrics (access control) BibRef

Maity, S.P., Maity, H.K.,
M-ary reversible contrast mapping in reversible watermarking with optimal distortion control,
NCVPRIPG13(1-4)
IEEE DOI Link 1408
data encapsulation BibRef

Lalitha, M., Holalad, H., Rajput, S., Muktanidhi, S.D., Mudenagudi, U.,
A classifier framework for the detection of doctored images,
NCVPRIPG13(1-4)
IEEE DOI Link 1408
Bayes methods BibRef

Mall, V., Roy, A.K., Mitra, S.K.,
Digital image tampering detection and localization using singular value decomposition technique,
NCVPRIPG13(1-4)
IEEE DOI Link 1408
cameras BibRef

Ma, P.F.[Peng-Fei], Wang, R.D.[Rang-Ding], Yan, D.Q.[Di-Qun], Jin, C.[Chao],
A Huffman Table Index Based Approach to Detect Double MP3 Compression,
IWDW13(258-271).
Springer DOI Link 1407
BibRef

Gao, S.[Shang], Zhang, C.[Cong], Wu, C.L.[Chan-Le], Ye, G.[Gang], Huang, L.[Lei],
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image,
IWDW13(303-313).
Springer DOI Link 1407
BibRef

Shen, C.[Chao], Cai, Z.M.[Zhong-Min], Maxion, R.A.[Roy A.], Guan, X.H.[Xiao-Hong],
On User Interaction Behavior as Evidence for Computer Forensic Analysis,
IWDW13(221-231).
Springer DOI Link 1407
BibRef

Yang, J.Q.[Jian-Quan], Zhu, G.P.[Guo-Pu], Wang, J.L.[Jun-Long], Shi, Y.Q.[Yun Qing],
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration,
IWDW13(169-179).
Springer DOI Link 1407
BibRef

Zhao, X.D.[Xu-Dong], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua], Yuan, Q.Q.[Quan-Qiao],
Image splicing detection based on noncausal Markov model,
ICIP13(4462-4466)
IEEE DOI Link 1402
Image splicing detection BibRef

Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando], Liste, N.[Noelia],
Quantization lattice estimation for multimedia forensics,
ICIP13(4452-4456)
IEEE DOI Link 1402
Dual lattice; lattice estimation; multimedia forensics; noisy estimation BibRef

Wu, C.M.[Chao-Ming],
Multi-level tamper detection and recovery with tamper type identification,
ICIP13(4512-4516)
IEEE DOI Link 1402
adjacent-block based detection BibRef

Conotter, V., Comesana, P., Perez-Gonzalez, F.,
Forensic analysis of full-frame linearly filtered JPEG images,
ICIP13(4517-4521)
IEEE DOI Link 1402
JPEG compression;linear filtering BibRef

Bian, S.[Shan], Luo, W.[Weiqi], Huang, J.W.[Ji-Wu],
Exposing fake bitrate video and its original bitrate,
ICIP13(4492-4496)
IEEE DOI Link 1402
Digital Video Forensics; Fake Bitrate Video; Video Bitrate Estimation BibRef

Khan, Z.[Zohaib], Shafait, F.[Faisal], Mian, A.[Ajmal],
Hyperspectral Document Imaging: Challenges and Perspectives,
CBDAR13(150-163).
Springer DOI Link 1404
BibRef
Earlier:
Hyperspectral Imaging for Ink Mismatch Detection,
ICDAR13(877-881)
IEEE DOI Link 1312
document image processing BibRef

Jain, R., Doermann, D.,
VisualDiff: Document Image Verification and Change Detection,
ICDAR13(40-44)
IEEE DOI Link 1312
document image processing BibRef

Tsesmelis, T.[Theodore], Christensen, L.[Lars], Fihl, P.[Preben], Moeslund, T.B.[Thomas B.],
Tamper detection for active surveillance systems,
AVSS13(57-62)
IEEE DOI Link 1311
Cameras BibRef

García-Ordás, D.[Diego], Fernández-Robles, L.[Laura], Alegre, E.[Enrique], García-Ordás, M.T.[María Teresa],
Automatic Tampering Detection in Spliced Images with Different Compression Levels,
IbPRIA13(416-423).
Springer DOI Link 1307
BibRef

Pollard, S.[Stephen], Simske, S.[Steven], Adams, G.[Guy],
Print biometrics: Recovering forensic signatures from halftone images,
ICPR12(1651-1654).
WWW Version. 1302
BibRef

Li, H.D.[Hao-Dong], Luo, W.Q.[Wei-Qi], Huang, J.W.[Ji-Wu],
Countering anti-JPEG compression forensics,
ICIP12(241-244).
IEEE DOI Link 1302
BibRef

Korus, P.[Pawel], Dziech, A.[Andrzej],
Reconfigurable self-embedding with high quality restoration under extensive tampering,
ICIP12(2193-2196).
IEEE DOI Link 1302
BibRef

Maity, S.P.[Santi P.], Delpha, C.[Claude],
Optimal watermark power and host samples allocation under random gain attack,
ICIP12(2201-2204).
IEEE DOI Link 1302
BibRef

Di Crescenzo, G.[Giovanni], Arce, G.[Gonzalo],
Data Forensics Constructions from Cryptographic Hashing and Coding,
IWDW11(494-509).
Springer DOI Link 1208
BibRef

Vázquez-Padín, D.[David], Pérez-González, F.[Fernando],
Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces,
IWDW11(306-320).
Springer DOI Link 1208
BibRef

Zhang, R.[Rong], Wang, R.D.[Rang-Ding], Ng, T.T.[Tian-Tsong],
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges,
IWDW11(292-305).
Springer DOI Link 1208
BibRef

Zhao, X.D.[Xu-Dong], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua], Lin, X.[Xiang],
A Distributed Scheme for Image Splicing Detection,
IWDW13(314-325).
Springer DOI Link 1407
BibRef
Earlier: A1, A2, A3, A4, Only:
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection,
IWDW11(243-256).
Springer DOI Link 1208
BibRef
Earlier: A1, A4, A3, A2, Only:
Detecting Digital Image Splicing in Chroma Spaces,
DW10(12-22).
Springer DOI Link 1010
BibRef

Chen, L.[Luyi], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua],
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection,
IWDW11(376-386).
Springer DOI Link 1208
BibRef

Zhou, L.N.[Lin-Na], Guo, Y.B.[Yun-Biao], You, X.G.[Xin-Gang],
Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor,
IWDW11(257-267).
Springer DOI Link 1208
BibRef

Bateman, P.J.[Philip J.], Ho, A.T.S.[Anthony T. S.], Briffa, J.A.[Johann A.],
Image Forensics of High Dynamic Range Imaging,
IWDW11(336-348).
Springer DOI Link 1208
BibRef

Kwok, C.W.[Chun-Wing], Au, O.C., Chui, S.H.[Sung-Him],
Alternative Anti-Forensics Method for Contrast Enhancement,
IWDW11(398-410).
Springer DOI Link 1208
BibRef

Chen, L.[Licong], Shi, Y.Q.[Yun Q.], Sutthiwan, P.[Patchara], Niu, X.X.[Xin-Xin],
Non-uniform Quantization in Breaking HUGO,
IWDW13(48-62).
Springer DOI Link 1407
BibRef

Sutthiwan, P.[Patchara], Shi, Y.Q.[Yun Q.],
Anti-Forensics of Double JPEG Compression Detection,
IWDW11(411-424).
Springer DOI Link 1208
BibRef

Wang, J.X.[Jun-Xiang], Ni, J.Q.[Jiang-Qun], Pan, J.[Jinwei],
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding,
IWDW11(42-56).
Springer DOI Link 1208
BibRef

Liu, H.M.[Hong-Mei], Li, L.[Lei], Li, J.[Jian], Huang, J.W.[Ji-Wu],
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates,
IWDW11(167-180).
Springer DOI Link 1208
BibRef

Nguyen, H.C.[Hieu Cuong], Katzenbeisser, S.[Stefan],
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images,
IWDW11(387-397).
Springer DOI Link 1208
BibRef

Jung, D.J.[Dae-Jin], Hyun, D.K.[Dai-Kyung], Ryu, S.J.[Seung-Jin], Lee, J.W.[Ji-Won], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity,
IWDW11(281-291).
Springer DOI Link 1208
BibRef

Pan, X.[Xunyu], Zhang, X.[Xing], Lyu, S.W.[Si-Wei],
Exposing image splicing with inconsistent local noise variances,
ICCP12(1-10).
IEEE DOI Link 1208
BibRef

Wu, R.[Ruoyu], Li, X.L.[Xiao-Long], Yang, B.[Bin],
Identifying computer generated graphics via histogram features,
ICIP11(1933-1936).
IEEE DOI Link 1201
BibRef

Ananya, U, Mudenagudi, U.[Uma],
Detection of doctored images using bispectral analysis,
ICIIP11(1-6).
IEEE DOI Link 1112
BibRef

Zhu, S.Y.[Shu-Yi], Cao, X.C.[Xiao-Chun], Zhao, H.D.[Han-Dong],
Photographic Composite Detection Using Two Circles,
ICIG11(858-863).
IEEE DOI Link 1109
BibRef

Dong, L.[Lisha], Kong, X.W.[Xiang-Wei], Wang, B.[Bo], You, X.[Xin'gang],
Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients,
ICIG11(234-237).
IEEE DOI Link 1109
BibRef

Li, L.[Lu], Xue, J.R.[Jian-Ru], Wang, X.F.[Xiao-Feng], Tian, L.[Lihua],
A Robust Approach to Detect Tampering by Exploring Correlation Patterns,
CAIP11(II: 515-522).
Springer DOI Link 1109
BibRef

Zhao, Y.Q.[Yu Qian], Shih, F.Y.[Frank Y.], Shi, Y.Q.[Yun Q.],
Passive Detection of Paint-Doctored JPEG Images,
DW10(1-11).
Springer DOI Link 1010
BibRef

Cao, H.[Hong], Kot, A.C.[Alex C.],
Detection of Tampering Inconsistencies on Mobile Photos,
DW10(105-119).
Springer DOI Link 1010
BibRef

Wang, W.[Wei], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise,
DW10(120-133).
Springer DOI Link 1010
BibRef

Serra-Ruiz, J., Megias, D.,
DWT and TSVQ-based Semi-fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images,
PSIVT10(331-336).
IEEE DOI Link 1011
BibRef

Goodwin, J.[Julian], Chetty, G.[Girija],
Blind Video Tamper Detection Based on Fusion of Source Features,
DICTA11(608-613).
IEEE DOI Link 1205
BibRef

Chetty, G.[Girija], Goodwin, J.[Julian], Singh, M.[Monica],
Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features,
ACIVS10(II: 79-87).
Springer DOI Link 1012
BibRef

Stamm, M.C.[Matthew C.], Tjoa, S.K.[Steven K.], Lin, W.S.[W. Sabrina], Liu, K.J.R.[K. J. Ray],
Undetectable image tampering through JPEG compression anti-forensics,
ICIP10(2109-2112).
IEEE DOI Link 1009
BibRef

Wang, W.[Wei], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Image tampering detection based on stationary distribution of Markov chain,
ICIP10(2101-2104).
IEEE DOI Link 1009
BibRef

Ardizzone, E.[Edoardo], Bruno, A.[Alessandro], Mazzola, G.[Giuseppe],
Detecting multiple copies in tampered images,
ICIP10(2117-2120).
IEEE DOI Link 1009
See also Visual Saliency by Keypoints Distribution Analysis. BibRef

Yao, X.Z.[Xin-Zhi], Liu, H.M.[Hong-Mei], Rui, W.[Wei], Huang, J.W.[Ji-Wu],
Content-based authentication algorithm for binary images,
ICIP09(2893-2896).
IEEE DOI Link 0911
Tamper detection BibRef

Ohkita, K.[Kazuya], Yoshida, M.[Maki], Kitamura, I.[Itaru], Fujiwara, T.[Toru],
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking,
DW09(279-293).
Springer DOI Link 0908
BibRef

Sutcu, Y., Coskun, B., Sencar, H.T., Memon, N.,
Tamper Detection Based on Regularity of Wavelet Transform Coefficients,
ICIP07(I: 397-400).
IEEE DOI Link 0709
BibRef

Gou, H.M.[Hong-Mei], Swaminathan, A.[Ashwin], Wu, M.[Min],
Noise Features for Image Tampering Detection and Steganalysis,
ICIP07(VI: 97-100).
IEEE DOI Link 0709
BibRef

Kihara, M.[Mirei], Fujiyoshi, M.[Masaaki], Wan, Q.T.[Qing Tao], Kiya, H.[Hitoshi],
Image Tamper Detection using Mathematical Morphology,
ICIP07(VI: 101-104).
IEEE DOI Link 0709
BibRef

Roy, S.[Sujoy], Sun, Q.[Qibin],
Robust Hash for Detecting and Localizing Image Tampering,
ICIP07(VI: 117-120).
IEEE DOI Link 0709
BibRef

Swaminathan, A., Wu, M.[Min], Liu, K.J.R.,
Image Tampering Identification using Blind Deconvolution,
ICIP06(2309-2312).
IEEE DOI Link 0610
BibRef

Wu, Y.D.[Yong-Dong],
Tamper-Localization Watermarking with Systematic Error Correcting Code,
ICIP06(1965-1968).
IEEE DOI Link 0610
BibRef

Liu, Y., Boncelet, C.G.[Charles G.],
The Crc-Ntmac for Image Tamper Proofing and Authentication,
ICIP06(1985-1988).
IEEE DOI Link 0610
BibRef

Boncelet, C.G.,
Image Authentication and Tamperproofing for Noisy Channels,
ICIP05(I: 677-680).
IEEE DOI Link 0512
BibRef

Watanabe, J.[Jun], Hasegawa, M., Kato, S.,
A study on a watermarking method for both copyright protection and tamper detection,
ICIP04(IV: 2155-2158).
IEEE DOI Link 0505
BibRef

Wu, J.H.[Jin-Hai], Zhu, B.B., Li, S.P.[Shi-Peng], Lin, F.[Fuzong],
A secure image authentication algorithm with pixel-level tamper localization,
ICIP04(III: 1573-1576).
IEEE DOI Link 0505
BibRef

Inoue, H.,
Wavelet-based Watermarking for Tamper Proofing of Still Images,
ICIP00(Vol II: 88-91).
IEEE DOI Link 0008
BibRef

Fridrich, J.,
Image watermarking for tamper detection,
ICIP98(II: 404-408).
IEEE DOI Link 9810
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Source Camera Identification .


Last update:Oct 15, 2014 at 21:10:33